Preview Tool

Cisco Bug: CSCus69513 - wlc: Evaluation of glibc GHOST vulnerability - CVE-2015-0235

Last Modified

Nov 20, 2018

Products (1)

  • Cisco 5500 Series Wireless Controllers

Known Affected Releases

7.0(250.0) 7.2(100.0) 7.3(100.0) 7.4(100.0) 7.5(102.0) 7.6(100.0) 8.0(110.0) 8.1(10.200)

Description (partial)

On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. This vulnerability is related to the various gethostbyname functions included in glibc and affect applications that call these functions. This vulnerability may allow an attacker to obtain sensitive information from an exploited system or, in some instances, perform remote code execution with the privileges of the application being exploited. This vulnerability is documented in CVE-2015-0235.

A Cisco Security Advisory has been published to document this vulnerability at:

This bug has been opened to address the potential impact on this product.

WLC would need to be configured for SCEP, Radius DNS, or while downloading/uploading  a file from a server
This applies to all WLC releases/HW types

Related Community Discussions

<key>CSCus69513</key> - wlc Evaluation of glibc GHOST vulnerability - CVE-2015-0235
Which are Known Fixed Releases?   I understand all hw and releases are vulnerable (but bug is not clear in Known Affected Releases section)
Latest activity: Mar 23, 2015
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.