Cisco Bug: CSCus69457 - Evaluation of glibc GHOST vulnerability - CVE-2015-0235
Nov 27, 2018
- Cisco Unified Computing System
Known Affected Releases
2.1(3e)B 2.2(1e)B 3.0(1d)B
Symptom: On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235. A Cisco Security Advisory has been published to document this vulnerability at: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost Cisco has analyzed this vulnerability and concluded that the previously listed products are not impacted. Conditions: The code has been analyzed and it was found that there is not active codes paths which use the function. However in a future release and in newer products we will upgrade the version of glibc to fully resolve the issue.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases