Two vulnerabilities have been discovered in VirtualBox, a x86
virtualisation solution, which might result in denial of service.
Monthly Archives: January 2015
Vuln: OpenSSL 'no-ssl3' Build Option Security Bypass Vulnerability
OpenSSL ‘no-ssl3’ Build Option Security Bypass Vulnerability
Vuln: CodeWrights 'HART DTM' Library CVE-2014-9191 Denial of Service Vulnerability
CodeWrights ‘HART DTM’ Library CVE-2014-9191 Denial of Service Vulnerability
UPDATED: VMSA-2014-0012.1 – VMware vSphere product updates address security vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2014-0012.1
Synopsis: VMware vSphere product updates address security
vulnerabilities
Issue date: 2014-12-04
Updated on: 2015-01-27
CVE number: CVE-2014-3797, CVE-2014-8371, CVE-2013-2877, CVE-2014-0191,
CVE-2014-0015, CVE-2014-0138, CVE-2013-1752 and
CVE-2013-4238
- ------------------------------------------------------------------------
1. Summary
VMware vSphere product updates address a Cross Site Scripting issue,
a certificate validation issue and security vulnerabilities in
third-party libraries.
2. Relevant releases
VMware vCenter Server Appliance 5.1 Prior to Update 3
VMware vCenter Server 5.5 prior to Update 2
VMware vCenter Server 5.1 prior to Update 3
VMware vCenter Server 5.0 prior to Update 3c
VMware ESXi 5.1 without patch ESXi510-201412101-SG
VMware ESXi 5.5
VMware ESXi 5.0
3. Problem Description
a. VMware vCSA cross-site scripting vulnerability
VMware vCenter Server Appliance (vCSA) contains a vulnerability
that may allow for Cross Site Scripting. Exploitation of this
vulnerability in vCenter Server requires tricking a user to click
on a malicious link or to open a malicious web page.
VMware would like to thank Tanya Secker of Trustwave SpiderLabs for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3797 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCSA 5.5 any Not Affected
vCSA 5.1 any 5.1 Update 3
vCSA 5.0 any Not Affected
b. vCenter Server certificate validation issue
vCenter Server does not properly validate the presented certificate
when establishing a connection to a CIM Server residing on an ESXi
host. This may allow for a Man-in-the-middle attack against the CIM
service.
VMware would like to thank The Google Security Team for reporting
this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8371 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= ==============
vCenter Server 5.5 any 5.5 Update 2
vCenter Server 5.1 any 5.1 Update 3
vCenter Server 5.0 any 5.0 Update 3c
c. Update to ESXi libxml2 package
libxml2 is updated to address multiple security issues.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2013-2877 and
CVE-2014-0191 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 any see VMSA-2015-0001
ESXi 5.1 any ESXi510-201412101-SG
ESXi 5.0 any see VMSA-2015-0001
d. Update to ESXi Curl package
Curl is updated to address multiple security issues.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2014-0015 and
CVE-2014-0138 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 any Patch Pending
ESXi 5.1 any ESXi510-201412101-SG
ESXi 5.0 any Patch Pending
e. Update to ESXi Python package
Python is updated to address multiple security issues.
The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CVE-2013-1752 and
CVE-2013-4238 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 any Patch Pending
ESXi 5.1 any ESXi510-201412101-SG
ESXi 5.0 any Patch Pending
f. vCenter and Update Manager, Oracle JRE 1.6 Update 81
Oracle has documented the CVE identifiers that are addressed in
JRE 1.6.0 update 81 in the Oracle Java SE Critical Patch Update
Advisory of July 2014. The References section provides a link to
this advisory.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any not applicable *
vCenter Server 5.1 any 5.1 Update 3
vCenter Server 5.0 any patch pending
vCenter Update Manager 5.5 any not applicable *
vCenter Update Manager 5.1 any 5.1 Update 3
vCenter Update Manager 5.0 any patch pending
* this product uses the Oracle JRE 1.7.0 family
4. Solution
Please review the patch/release notes for your product and version
and verify the checksum of your downloaded file.
vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and Update Manager 5.1
Update 3
----------------------------
Downloads and Documentation:
https://www.vmware.com/go/download-vsphere
ESXi 5.1
----------------------------
File: update-from-esxi5.1-5.1_update03.zip.zip
md5sum: b3fd3549b59c6c59c04bfd09b08c6edf
sha1sum: 02139101fe205894774caac02820f6ea8416fb8b
http://kb.vmware.com/kb/2086288
update-from-esxi5.1-5.1_update03 contains ESXi510-201412101-SG
5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3797
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238
JRE
Oracle Java SE Critical Patch Update Advisory of July 2014
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- ------------------------------------------------------------------------
6. Change log
2014-12-04 VMSA-2014-0012
Initial security advisory in conjunction with the release of VMware
vCSA 5.1 Update 3, vCenter Server 5.1 Update 3 and ESXi 5.1 Patches
released on 2014-12-04.
2015-01-27 VMSA-2014-0012.1
Security advisory updated in conjunction with the release of
VMware ESXi 5.5 Patches released on 2015-01-27.
- ------------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8
wj8DBQFUxqHHDEcm8Vbi9kMRAoSaAKD0BgI72YbonTMBbjAp1UMsFE2eBQCaAoPT
tg8/S+hjkMsW8AV18Kkj8Tw=
=UwKa
-----END PGP SIGNATURE-----
NEW VMSA-2015-0001 – VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
Posted by VMware Security Response Center on Jan 27
————————————————————————
VMware Security Advisory
Advisory ID: VMSA-2015-0001
Synopsis: VMware vCenter Server, ESXi, Workstation, Player, and Fusion
updates address security issues
Issue date: 2015-01-27
Updated on: 2015-01-27 (Initial Advisory)
CVE number: CVE-2014-8370, CVE-2015-1043, CVE-2015-1044
— OPENSSL—
CVE-2014-3513,…
NEW: VMSA-2015-0001 – VMware vCenter Server, ESXi, Workstation, Player, and Fusion updates address resolve security issues
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
VMware Security Advisory
Advisory ID: VMSA-2015-0001
Synopsis: VMware vCenter Server, ESXi, Workstation, Player, and Fusion
updates address security issues
Issue date: 2015-01-27
Updated on: 2015-01-27 (Initial Advisory)
CVE number: CVE-2014-8370, CVE-2015-1043, CVE-2015-1044
--- OPENSSL---
CVE-2014-3513, CVE-2014-3567,CVE-2014-3566, CVE-2014-3568
--- libxml2 ---
CVE-2014-3660
- ------------------------------------------------------------------------
1. Summary
VMware vCenter Server, ESXi, Workstation, Player and Fusion address
several security issues.
2. Relevant Releases
VMware Workstation 10.x prior to version 10.0.5
VMware Player 6.x prior to version 6.0.5
VMware Fusion 7.x prior to version 7.0.1
VMware Fusion 6.x prior to version 6.0.5
vCenter Server 5.5 prior to Update 2d
ESXi 5.5 without patch ESXi550-201403102-SG, ESXi550-201501101-SG
ESXi 5.1 without patch ESXi510-201404101-SG
ESXi 5.0 without patch ESXi500-201405101-SG
3. Problem Description
a. VMware ESXi, Workstation, Player, and Fusion host privilege
escalation vulnerability
VMware ESXi, Workstation, Player and Fusion contain an arbitrary
file write issue. Exploitation this issue may allow for privilege
escalation on the host.
The vulnerability does not allow for privilege escalation from
the guest Operating System to the host or vice-versa. This means
that host memory can not be manipulated from the Guest Operating
System.
Mitigation
For ESXi to be affected, permissions must have been added to ESXi
(or a vCenter Server managing it) for a virtual machine
administrator role or greater.
VMware would like to thank Shanon Olsson for reporting this issue to
us through JPCERT.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2014-8370 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any 6.0.5
ESXi 5.5 ESXi ESXi550-201403102-SG
ESXi 5.1 ESXi ESXi510-201404101-SG
ESXi 5.0 ESXi ESXi500-201405101-SG
b. VMware Workstation, Player, and Fusion Denial of Service
vulnerability
VMware Workstation, Player, and Fusion contain an input validation
issue in the Host Guest File System (HGFS). This issue may allow
for a Denial of Service of the Guest Operating system.
VMware would like to thank Peter Kamensky from Digital Security for
reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1043 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any 7.0.1
Fusion 6.x any 6.0.5
c. VMware ESXi, Workstation, and Player Denial of Service
vulnerability
VMware ESXi, Workstation, and Player contain an input
validation issue in VMware Authorization process (vmware-authd).
This issue may allow for a Denial of Service of the host. On
VMware ESXi and on Workstation running on Linux the Denial of
Service would be partial.
VMware would like to thank Dmitry Yudin < at >ret5et for reporting
this issue to us through HP's Zero Day Initiative.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifier CVE-2015-1044 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
Workstation 11.x any not affected
Workstation 10.x any 10.0.5
Player 7.x any not affected
Player 6.x any 6.0.5
Fusion 7.x any not affected
Fusion 6.x any not affected
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi ESXi510-201410101-SG
ESXi 5.0 ESXi not affected
d. Update to VMware vCenter Server and ESXi for OpenSSL 1.0.1
and 0.9.8 package
The OpenSSL library is updated to version 1.0.1j or 0.9.8zc
to resolve multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2014-3513, CVE-2014-3567,
CVE-2014-3566 ("POODLE") and CVE-2014-3568 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
vCenter Server 5.5 any Update 2d*
vCenter Server 5.1 any patch pending
vCenter Server 5.0 any patch pending
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
* The VMware vCenter 5.5 SSO component will be
updated in a later release
e. Update to ESXi libxml2 package
The libxml2 library is updated to version libxml2-2.7.6-17
to resolve a security issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3660 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======= ======= =================
ESXi 5.5 ESXi ESXi550-201501101-SG
ESXi 5.1 ESXi patch pending
ESXi 5.0 ESXi patch pending
4. Solution
Please review the patch/release notes for your product and
version and verify the checksum of your downloaded file.
VMware Workstation 10.x
--------------------------------
https://www.vmware.com/go/downloadworkstation
VMware Player 6.x
--------------------------------
https://www.vmware.com/go/downloadplayer
VMware Fusion 7.x and 6.x
--------------------------------
https://www.vmware.com/go/downloadplayer
vCenter Server
----------------------------
Downloads and Documentation:
https://www.vmware.com/go/download-vsphere
ESXi 5.5 Update 2d
----------------------------
File: update-from-esxi5.5-5.5_update01.zip
md5sum: 5773844efc7d8e43135de46801d6ea25
sha1sum: 6518355d260e81b562c66c5016781db9f077161f
http://kb.vmware.com/kb/2065832
update-from-esxi5.5-5.5_update01 contains ESXi550-201403102-SG
ESXi 5.5
----------------------------
File: ESXi550-201501001.zip
md5sum: b0f2edd9ad17d0bae5a11782aaef9304
sha1sum: 9cfcb1e2cf1bb845f0c96c5472d6b3a66f025dd1
http://kb.vmware.com/kb/2099265
ESXi550-201501001.zip contains ESXi550-201501101-SG
ESXi 5.1
----------------------------
File: ESXi510-201404001.zip
md5sum: 9dc3c9538de4451244a2b62d247e52c4
sha1sum: 6b1ea36a2711665a670afc9ae37cdd616bb6da66
http://kb.vmware.com/kb/2070666
ESXi510-201404001 contains ESXi510-201404101-SG
ESXi 5.0
----------------------------
File: ESXi500-201405001.zip
md5sum: 7cd1afc97f5f1e4b4132c90835f92e1d
sha1sum: 4bd77eeb5d7fc65bbb6f25762b0fa74fbb9679d5
http://kb.vmware.com/kb/2075521
ESXi500-201405001 contains ESXi500-201405101-SG
5. References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660
- ------------------------------------------------------------------------
6. Change log
2015-01-27 VMSA-2015-0001
Initial security advisory in conjunction with the release of VMware
Workstation 10.0.5, VMware Player 6.0.5, vCenter Server 5.5 Update 2d
and, ESXi 5.5 Patches released on 2015-01-27.
- ------------------------------------------------------------------------
7. Contact
E-mail list for product security notifications and announcements:
http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com
PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories
http://www.vmware.com/security/advisories
Consolidated list of VMware Security Advisories
http://kb.vmware.com/kb/2078735
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
Twitter
https://twitter.com/VMwareSRC
Copyright 2015 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE-----
Version: Encryption Desktop 10.3.0 (Build 8741)
Charset: utf-8
wj8DBQFUyAAUDEcm8Vbi9kMRAqJ1AKC7Lunm2bkxAO7cNCVrGIjKj0sA2ACfaiXz
Sr3Q15TFOOR5wos4xdhR3OI=
=3DtZ
-----END PGP SIGNATURE-----
CESA-2015:0092 Critical CentOS 6 glibc SecurityUpdate
CentOS Errata and Security Advisory 2015:0092 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0092.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0f0554770d7a565500adf20a0d403376de57f111118c04fed003266e2405598a glibc-2.12-1.149.el6_6.5.i686.rpm 167bd7bd46bd8cc6005397b1ea5048ee7868a8717935ee6f95e13b00d8f7499c glibc-common-2.12-1.149.el6_6.5.i686.rpm d6c144e7cd4b67ecf5eafb02671c0f6f48d27f81df97c35808d2d442c7db582e glibc-devel-2.12-1.149.el6_6.5.i686.rpm c9484d79a9aac4a8b706aa17f5edbd51b5e5731fe0afb3e9914b3e83de1e801a glibc-headers-2.12-1.149.el6_6.5.i686.rpm 250055e2980d905b82597cd8d6ef3e7b1dceec16da836b563bb781dc21d6ad1d glibc-static-2.12-1.149.el6_6.5.i686.rpm eea7f375894f8023953705e227ab82ab0fbe99915a4bab8d0e278392b43a1127 glibc-utils-2.12-1.149.el6_6.5.i686.rpm c66347ad9cf803554e12f0c259f4f67fa6d313d34a58201ea80f67f890c899f9 nscd-2.12-1.149.el6_6.5.i686.rpm x86_64: 0f0554770d7a565500adf20a0d403376de57f111118c04fed003266e2405598a glibc-2.12-1.149.el6_6.5.i686.rpm 51df53cceee0f4a7c1cbbc4cea8aecb1910eb1232592e330b6fe467eb2d7b5b5 glibc-2.12-1.149.el6_6.5.x86_64.rpm 65285684336366a98c5ac3c33982c0ccd0d5291563faea655b5fc6f47e8cfa63 glibc-common-2.12-1.149.el6_6.5.x86_64.rpm d6c144e7cd4b67ecf5eafb02671c0f6f48d27f81df97c35808d2d442c7db582e glibc-devel-2.12-1.149.el6_6.5.i686.rpm b6feecfbc9fbb10259c61ab60d7414d5a70c0cdef553fb2a4f14b7468e664160 glibc-devel-2.12-1.149.el6_6.5.x86_64.rpm 803fa33d7f62d944b019a644d1f3b0ec9f9e8aa67fde4c905cd7000939a1f872 glibc-headers-2.12-1.149.el6_6.5.x86_64.rpm 250055e2980d905b82597cd8d6ef3e7b1dceec16da836b563bb781dc21d6ad1d glibc-static-2.12-1.149.el6_6.5.i686.rpm 3668f99e7d21eea55d9b823e86c735ed946ccf8d4f7d6ca9adb8a5fd348238c8 glibc-static-2.12-1.149.el6_6.5.x86_64.rpm af41828eb52e0ae5c2d6239943f476cf186118edb4903ff884c5d6cc08665d6a glibc-utils-2.12-1.149.el6_6.5.x86_64.rpm bccce013dd1d94c1448eebb5febd25cc8abaa0bcb6b8bf744cf0eb2797b4f2bf nscd-2.12-1.149.el6_6.5.x86_64.rpm Source: 35b591c1fa712aba6b334d244374e182e0f1b7c1f85268c9bbc9dde42f4d9fb3 glibc-2.12-1.149.el6_6.5.src.rpm
Fedora 20 Security Update: qpid-cpp-0.30-7.fc20
Resolved Bugs
1184488 – build failure in qpid-cpp-0.30/src/tests/txshift.cpp
1181721 – CVE-2015-0203 qpid-cpp: qpidd can be crashed by authenticated user
1159008 – juno qpid: install qpid-cpp-server’ returned 1: Error: Package: qpid-cpp-client-0.30-3.fc21.x86_64<br
Resolves: BZ#1184488
Resolves: BZ#1181721
Resolves: BZ#1181721
Enabled building the linear store.
CESA-2015:0090 Critical CentOS 5 glibc SecurityUpdate
CentOS Errata and Security Advisory 2015:0090 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0090.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: de2d9fe25d7e178d02f19e05b9846218899d9fbee7954647ed7bf20bf82b932a glibc-2.5-123.el5_11.1.i386.rpm f6b6314b95cb7a1bdfe076fa2ecbc7726a78fe3861e7c4765e379e45450dd51a glibc-2.5-123.el5_11.1.i686.rpm 7f42ba356e442e9f9336f12cc3c7bc74720db4064256975ae876267bb68d1d1b glibc-common-2.5-123.el5_11.1.i386.rpm 2814251a11726dccff4d9c841e9c04ccc327000591cd5354267caf576b1e4bd1 glibc-devel-2.5-123.el5_11.1.i386.rpm e193b22ed56d39586f7161c02a5e66d0b5ef60785bef4ad00f2bee0fec0e037a glibc-headers-2.5-123.el5_11.1.i386.rpm a4ce5b65c002c59a2554df3a10416cb9db08b18a7540ef8b729d6cabb4b93ddc glibc-utils-2.5-123.el5_11.1.i386.rpm dc49612fa98f4a4ec9350994dd4e1aadaf696e3b4d3ba3d64c8d0b3d9f61e06d nscd-2.5-123.el5_11.1.i386.rpm x86_64: f6b6314b95cb7a1bdfe076fa2ecbc7726a78fe3861e7c4765e379e45450dd51a glibc-2.5-123.el5_11.1.i686.rpm 5e4038e4171fd179abb505261f3dcc4b30f5e1951c8ddedb8b0c3255e3eeac00 glibc-2.5-123.el5_11.1.x86_64.rpm c8c8c040a410d1fe55f5c31987f1e2b8acc0f5395c1fadd333dfbf13fe9eb54d glibc-common-2.5-123.el5_11.1.x86_64.rpm 2814251a11726dccff4d9c841e9c04ccc327000591cd5354267caf576b1e4bd1 glibc-devel-2.5-123.el5_11.1.i386.rpm 95bc9433ae83d6c0f1d272abf0922e67d294a6660aa31f6b32f2c049339e5c21 glibc-devel-2.5-123.el5_11.1.x86_64.rpm 381d969abd7036451949e4c7782d334865c24011d0cf4a9ebf16d3e0479dde29 glibc-headers-2.5-123.el5_11.1.x86_64.rpm 8f1f673e3dada621cf8ed943565f7bb3d3680497d918eb8dad3ae5d69176af23 glibc-utils-2.5-123.el5_11.1.x86_64.rpm 068c6219a96289c557796aee742b2728397b0bbf4398f53e3eb36e2e4f4aff7b nscd-2.5-123.el5_11.1.x86_64.rpm Source: c4830df76209da0fcd243d24f555a2c2af8345770f53553a83b7d75ad56fc201 glibc-2.5-123.el5_11.1.src.rpm
Linux "Ghost" Remote Code Execution Vulnerability
Original release date: January 27, 2015
The Linux GNU C Library (glibc) versions prior to 2.18 are vulnerable to remote code execution via a vulnerability in the gethostbyname function. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system. Linux distributions employing glibc-2.18 and later are not affected.
US-CERT recommends users and administrators refer to their respective Linux or Unix-based OS vendor(s) for an appropriate patch if affected. Patches are available from Ubuntu and Red Hat. The GNU C Library versions 2.18 and later are also available for experienced users and administrators to implement.
This product is provided subject to this Notification and this Privacy & Use policy.