Frank Kardasz, February 4, 2015
Introduction
The GHOST vulnerability sent rumblings through parts of the
computer security community recently. What
is GHOST and why is it important?
GHOST Defined
Qualys Inc., the company that re-branded the previously-discovered
vulnerability as GHOST and alerted the community to the security risk describes
GHOST as follows:
“The GHOST vulnerability is a
serious weakness in the Linux glibc library.
It allows attackers to remotely take complete control of the victim
system without having any prior knowledge of system credentials (Sarwate,
2015).”
Scope of the Problem
Computers using some (not all) Linux Operating systems may
be open to the GHOST vulnerability. One
source estimated that 14 million computer servers were vulnerable to the threat
(Stange, S. February, 2015). Computers
running Windows or MAC operating systems are not vulnerable to GHOST.
Vulnerable Systems
According to Nixcraft (2015), the following Linux
Distributions are affected:
RHEL (Red Hat Enterprise Linux)
version 5.x, 6.x and 7.x
CentOS Linux version 5.x, 6.x &
7.x
Ubuntu Linux version 10.04, 12.04
LTS
Debian Linux version 7.x
Linux Mint version 13.0
Fedora Linux version 19 or older
SUSE Linux Enterprise 11 and older
(also OpenSuse Linux 11 or older versions).
SUSE Linux Enterprise Software
Development Kit 11 SP3
SUSE Linux Enterprise Server 11 SP3
for VMware
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP2
LTSS
SUSE Linux Enterprise Server 11 SP1
LTSS
SUSE Linux Enterprise Server 10 SP4
LTSS
SUSE Linux Enterprise Desktop 11
SP3
Arch Linux glibc version <=
2.18-1
GNU C (glibc) Library
The Linux server weakness is within the Linux GNU C (glibc) Library.
The GNU C Library is an implementation of the standard C library and a
core part of the Linux operating system (Sarwate, 2015). Every Unix-like operating system needs a C
library. The C library defines the “system
calls'' and other basic facilities including open, malloc, printf, and exit
(GNU.org, 2015).
Buffer Overflow
The GHOST vulnerability may permit malicious hackers to gain
remote access by using buffer overflow. The
buffer is a temporary storage area, usually in the Random Access Memory
(RAM). The buffer is a holding area,
permitting the Central Processing Unit (CPU) to manipulate data before sending
it to a device (Beal, 2015). The space
within a buffer is limited, and an attacker can sometimes overwhelm the buffer
with too much data and then introduce malicious code to exploit or control the
victim’s computer (Kay, 2003).
Remote Code
Execution
GHOST permits a buffer overflow and remote code
execution. A remote code execution is a
situation where a computer hacker infiltrates the victims computer from
afar. In the GHOST case the researchers
were able to test the vulnerability and send a specially crafted email to the
vulnerable computer’s mail server thus enabling a remote shell to the victim’s
machine (Sarwate, 2015).
The Fix
Patches are available from various Linux distribution
sources that will fix the GHOST vulnerability.
Information about patches can be found at the Nixcraft site: http://www.cyberciti.biz/faq/cve-2015-0235-patch-ghost-on-debian-ubuntu-fedora-centos-rhel-linux/
Summary
The GHOST vulnerability is a serious weakness to many Linux
servers. Information technology
specialists should immediately patch vulnerable systems and stay on constant
alert for similar problems and patches.
Qualys offers an informative video about GHOST at the following link: https://www.youtube.com/watch?v=zHRRLsZtWAA
References
Beal, V. (2015). Buffer. Webopedia. Retrieved from http://www.webopedia.com/TERM/B/buffer.html
GNU.org. (September 7, 2014). The GNU C Library (glibc).
Retrieved from https://www.gnu.org/software/libc/index.html
Kay, R. (July 14, 2003). Buffer Overflow. Computerworld.
Retrieved from http://www.computerworld.com/article/2572130/security0/buffer-overflow.html
Nixcraft. (January 28, 2015). How To Patch and Protect Linux
Server Against the Glibc GHOST Vulnerability # CVE-2015-0235. Retrieved from http://www.cyberciti.biz/faq/cve-2015-0235-patch-ghost-on-debian-ubuntu-fedora-centos-rhel-linux/
Sarwate, A. (January 27, 2015). The
GHOST Vulnerability. Qualys Blog. Qualys Inc. Retrieved
from
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability
Stange, S. (February 3, 2015). Seven things you need to know
about the GHOST vulnerability. Security Features. Net Communities 2015.
Retrieved from http://www.itproportal.com/2015/02/03/seven-things-need-know-about-ghost-vulnerability
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
http://kardasz.blogspot.com/2015/02/ghost-vulnerability-things-to-know.html
No comments:
Post a Comment
Thank you for your thoughtful comments.