CVE-2015-0235 (CNNVD-201501-658)
CRITICAL
有利用代码
中文标题:
GNU glibc 基于堆的缓冲区错误漏洞
英文标题:
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x ve...
CVSS分数:
10.0
发布时间:
2015-01-28 19:00:00
漏洞类型:
缓冲区错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v5
漏洞描述
中文描述:
GNU glibc(又名GNU C Library,libc6)是一种按照LGPL许可协议发布的开源免费的C语言编译程序。 GNU glibc 2.2版本和2.18之前2.x版本中的‘__nss_hostname_digits_dots’函数存在基于堆的缓冲区溢出漏洞。本地和远程攻击者都可通过调用‘ gethostbyname*()’函数利用该漏洞以运行应用程序的用户权限执行任意代码,控制系统。
英文描述:
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
CWE类型:
CWE-787
标签:
dos
linux
1n3
OSVDB-117579
remote
Qualys Corporation
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| gnu | glibc | * | - | - |
cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
|
| oracle | communications_application_session_controller | * | - | - |
cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*
|
| oracle | communications_eagle_application_processor | 16.0 | - | - |
cpe:2.3:a:oracle:communications_eagle_application_processor:16.0:*:*:*:*:*:*:*
|
| oracle | communications_eagle_lnp_application_processor | 10.0 | - | - |
cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*
|
| oracle | communications_lsms | 13.1 | - | - |
cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*
|
| oracle | communications_policy_management | 9.7.3 | - | - |
cpe:2.3:a:oracle:communications_policy_management:9.7.3:*:*:*:*:*:*:*
|
| oracle | communications_policy_management | 9.9.1 | - | - |
cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*
|
| oracle | communications_policy_management | 10.4.1 | - | - |
cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*
|
| oracle | communications_policy_management | 11.5 | - | - |
cpe:2.3:a:oracle:communications_policy_management:11.5:*:*:*:*:*:*:*
|
| oracle | communications_policy_management | 12.1.1 | - | - |
cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*
|
| oracle | communications_session_border_controller | * | - | - |
cpe:2.3:a:oracle:communications_session_border_controller:*:*:*:*:*:*:*:*
|
| oracle | communications_session_border_controller | 7.2.0 | - | - |
cpe:2.3:a:oracle:communications_session_border_controller:7.2.0:-:*:*:*:*:*:*
|
| oracle | communications_session_border_controller | 8.0.0 | - | - |
cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*
|
| oracle | communications_user_data_repository | * | - | - |
cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*
|
| oracle | communications_webrtc_session_controller | 7.0 | - | - |
cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*
|
| oracle | communications_webrtc_session_controller | 7.1 | - | - |
cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*
|
| oracle | communications_webrtc_session_controller | 7.2 | - | - |
cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*
|
| oracle | exalogic_infrastructure | 1.0 | - | - |
cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*
|
| oracle | exalogic_infrastructure | 2.0 | - | - |
cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
|
| oracle | vm_virtualbox | * | - | - |
cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*
|
| oracle | linux | 5 | - | - |
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
|
| oracle | linux | 7 | - | - |
cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*
|
| debian | debian_linux | 7.0 | - | - |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| redhat | virtualization | 6.0 | - | - |
cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | 1.0.0.0 | - | - |
cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | 1.1.0.0 | - | - |
cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*
|
| ibm | pureapplication_system | 2.0.0.0 | - | - |
cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
|
| ibm | security_access_manager_for_enterprise_single_sign-on | 8.2 | - | - |
cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*
|
| php | php | * | - | - |
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
72325
vdb-entry
cve.org
访问
cve.org
HPSBGN03247
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62883
third-party-advisory
cve.org
访问
cve.org
62691
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
APPLE-SA-2015-10-21-4
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
HPSBGN03285
vendor-advisory
cve.org
访问
cve.org
20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62698
third-party-advisory
cve.org
访问
cve.org
62640
third-party-advisory
cve.org
访问
cve.org
1032909
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
APPLE-SA-2015-09-30-3
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62688
third-party-advisory
cve.org
访问
cve.org
62865
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
HPSBHF03289
vendor-advisory
cve.org
访问
cve.org
APPLE-SA-2015-06-30-2
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62812
third-party-advisory
cve.org
访问
cve.org
62879
third-party-advisory
cve.org
访问
cve.org
HPSBGN03270
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62871
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62690
third-party-advisory
cve.org
访问
cve.org
62692
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62681
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62667
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
MDVSA-2015:039
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62517
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62680
third-party-advisory
cve.org
访问
cve.org
62813
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
GLSA-201503-04
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability
vendor-advisory
cve.org
访问
cve.org
91787
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
RHSA-2015:0126
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235
mailing-list
cve.org
访问
cve.org
62715
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
mailing-list
cve.org
访问
cve.org
HPSBMU03330
vendor-advisory
cve.org
访问
cve.org
20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
62870
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
DSA-3142
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
62816
third-party-advisory
cve.org
访问
cve.org
62758
third-party-advisory
cve.org
访问
cve.org
20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
mailing-list
cve.org
访问
cve.org
20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim
mailing-list
cve.org
访问
cve.org
20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
ExploitDB EDB-35951
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-35951
EXPLOIT
exploitdb
访问
exploitdb
CVE Reference: CVE-2015-0235
ADVISORY
cve.org
访问
cve.org
ExploitDB EDB-36421
EXPLOIT
exploitdb
访问
exploitdb
Download Exploit EDB-36421
EXPLOIT
exploitdb
访问
exploitdb
CVSS评分详情
10.0
CRITICAL
CVSS向量:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本:
2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2015-01-28 19:00:00
修改时间:
2024-08-06 04:03:10
创建时间:
2025-11-11 15:33:57
更新时间:
2025-11-11 16:33:17
利用信息
此漏洞有可利用代码!
利用代码数量:
2
利用来源:
未知
未知
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2015-0235 |
2025-11-11 15:18:52 | 2025-11-11 07:33:57 |
| NVD | nvd_CVE-2015-0235 |
2025-11-11 14:54:48 | 2025-11-11 07:42:40 |
| CNNVD | cnnvd_CNNVD-201501-658 |
2025-11-11 15:09:32 | 2025-11-11 07:51:48 |
| EXPLOITDB | exploitdb_EDB-35951 |
2025-11-11 15:05:24 | 2025-11-11 08:32:27 |
| EXPLOITDB | exploitdb_EDB-36421 |
2025-11-11 15:05:26 | 2025-11-11 08:33:17 |
版本与语言
当前版本:
v5
主要语言:
EN
支持语言:
EN
ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5
EXPLOITDB
2025-11-11 16:33:17
references_count: 93 → 95; tags_count: 4 → 6
查看详细变更
- references_count: 93 -> 95
- tags_count: 4 -> 6
v4
EXPLOITDB
2025-11-11 16:32:27
references_count: 90 → 93; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- references_count: 90 -> 93
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3
CNNVD
2025-11-11 15:51:48
vulnerability_type: 未提取 → 缓冲区错误; cnnvd_id: 未提取 → CNNVD-201501-658; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-201501-658
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:42:40
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 31; references_count: 92 → 90; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 10.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 31
- references_count: 92 -> 90
- data_sources: ['cve'] -> ['cve', 'nvd']