CVE-2015-0235 (CNNVD-201501-658)

CRITICAL 有利用代码
中文标题:
GNU glibc 基于堆的缓冲区错误漏洞
英文标题:
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x ve...
CVSS分数: 10.0
发布时间: 2015-01-28 19:00:00
漏洞类型: 缓冲区错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v5
漏洞描述
中文描述:

GNU glibc(又名GNU C Library,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。 GNU glibc 2.2版本和2.18之前2.x版本中的‘__nss_hostname_digits_dots’函数存在基于堆的缓冲区溢出漏洞。本地和远程攻击者都可通过调用‘ gethostbyname*()’函数利用该漏洞以运行应用程序的用户权限执行任意代码,控制系统。

英文描述:

Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

CWE类型:
CWE-787
标签:
dos linux 1n3 OSVDB-117579 remote Qualys Corporation
受影响产品
厂商 产品 版本 版本范围 平台 CPE
gnu glibc * - - cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
oracle communications_application_session_controller * - - cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*
oracle communications_eagle_application_processor 16.0 - - cpe:2.3:a:oracle:communications_eagle_application_processor:16.0:*:*:*:*:*:*:*
oracle communications_eagle_lnp_application_processor 10.0 - - cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*
oracle communications_lsms 13.1 - - cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*
oracle communications_policy_management 9.7.3 - - cpe:2.3:a:oracle:communications_policy_management:9.7.3:*:*:*:*:*:*:*
oracle communications_policy_management 9.9.1 - - cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*
oracle communications_policy_management 10.4.1 - - cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*
oracle communications_policy_management 11.5 - - cpe:2.3:a:oracle:communications_policy_management:11.5:*:*:*:*:*:*:*
oracle communications_policy_management 12.1.1 - - cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*
oracle communications_session_border_controller * - - cpe:2.3:a:oracle:communications_session_border_controller:*:*:*:*:*:*:*:*
oracle communications_session_border_controller 7.2.0 - - cpe:2.3:a:oracle:communications_session_border_controller:7.2.0:-:*:*:*:*:*:*
oracle communications_session_border_controller 8.0.0 - - cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
oracle communications_user_data_repository * - - cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*
oracle communications_webrtc_session_controller 7.0 - - cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*
oracle communications_webrtc_session_controller 7.1 - - cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*
oracle communications_webrtc_session_controller 7.2 - - cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*
oracle exalogic_infrastructure 1.0 - - cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*
oracle exalogic_infrastructure 2.0 - - cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
oracle vm_virtualbox * - - cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
oracle linux 5 - - cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
oracle linux 7 - - cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*
debian debian_linux 7.0 - - cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
debian debian_linux 8.0 - - cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
redhat virtualization 6.0 - - cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
apple mac_os_x * - - cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
ibm pureapplication_system 1.0.0.0 - - cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*
ibm pureapplication_system 1.1.0.0 - - cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*
ibm pureapplication_system 2.0.0.0 - - cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
ibm security_access_manager_for_enterprise_single_sign-on 8.2 - - cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*
php php * - - cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
72325 vdb-entry
cve.org
访问
HPSBGN03247 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62883 third-party-advisory
cve.org
访问
62691 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
APPLE-SA-2015-10-21-4 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBGN03285 vendor-advisory
cve.org
访问
20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235) mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62698 third-party-advisory
cve.org
访问
62640 third-party-advisory
cve.org
访问
1032909 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
APPLE-SA-2015-09-30-3 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62688 third-party-advisory
cve.org
访问
62865 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
HPSBHF03289 vendor-advisory
cve.org
访问
APPLE-SA-2015-06-30-2 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62812 third-party-advisory
cve.org
访问
62879 third-party-advisory
cve.org
访问
HPSBGN03270 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62871 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62690 third-party-advisory
cve.org
访问
62692 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62681 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62667 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
MDVSA-2015:039 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62517 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62680 third-party-advisory
cve.org
访问
62813 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
GLSA-201503-04 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability vendor-advisory
cve.org
访问
91787 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
RHSA-2015:0126 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235 mailing-list
cve.org
访问
62715 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow mailing-list
cve.org
访问
HPSBMU03330 vendor-advisory
cve.org
访问
20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow mailing-list
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
62870 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
DSA-3142 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
62816 third-party-advisory
cve.org
访问
62758 third-party-advisory
cve.org
访问
20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series mailing-list
cve.org
访问
20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim mailing-list
cve.org
访问
20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
ExploitDB EDB-35951 EXPLOIT
exploitdb
访问
Download Exploit EDB-35951 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2015-0235 ADVISORY
cve.org
访问
ExploitDB EDB-36421 EXPLOIT
exploitdb
访问
Download Exploit EDB-36421 EXPLOIT
exploitdb
访问
CVSS评分详情
10.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2015-01-28 19:00:00
修改时间:
2024-08-06 04:03:10
创建时间:
2025-11-11 15:33:57
更新时间:
2025-11-11 16:33:17
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2015-0235 2025-11-11 15:18:52 2025-11-11 07:33:57
NVD nvd_CVE-2015-0235 2025-11-11 14:54:48 2025-11-11 07:42:40
CNNVD cnnvd_CNNVD-201501-658 2025-11-11 15:09:32 2025-11-11 07:51:48
EXPLOITDB exploitdb_EDB-35951 2025-11-11 15:05:24 2025-11-11 08:32:27
EXPLOITDB exploitdb_EDB-36421 2025-11-11 15:05:26 2025-11-11 08:33:17
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:33:17
references_count: 93 → 95; tags_count: 4 → 6
查看详细变更
  • references_count: 93 -> 95
  • tags_count: 4 -> 6
v4 EXPLOITDB
2025-11-11 16:32:27
references_count: 90 → 93; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 90 -> 93
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:51:48
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-201501-658; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 缓冲区错误
  • cnnvd_id: 未提取 -> CNNVD-201501-658
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:42:40
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 31; references_count: 92 → 90; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 10.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 31
  • references_count: 92 -> 90
  • data_sources: ['cve'] -> ['cve', 'nvd']