Qualys Security Advisory – glibc gethostbyname Buffer Overflow

Qualys Security Advisory – During a code audit performed internally at Qualys, they discovered a buffer overflow in the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions, so they decided to analyze it — and its impact — thoroughly, and named this vulnerability “GHOST”.

Leave a Reply