Reset Search
 

 

Article

SA40021 - GHOST glibc gethostbyname() buffer overflow (CVE-2015-0235)

« Go Back

Information

 
Product Affected
Problem
A buffer overflow vulnerability has been discovered in the glibc library. This issue is known as CVE-2015-0235 and is commonly referred to as "GHOST". The issue was found in the gethostbyname() and gethostbyname2() functions in within the glibc library. If vulnerable, this issue could potentially allow an attacker to gain remote code execution with the privilege of the user of the exploited application or service.
Solution
 
ProductStatus
Pulse Connect SecureNot Vulnerable
Pulse Policy SecureNot Vulnerable
Pulse Secure Desktop client (Windows & Mac OS X)Not Vulnerable
Network Connect for Windows and Mac OS XNot Vulnerable
Network Connect for LinuxNot Vulnerable
*As long as the client operating system is patched to resolve the ghost issue
Installer ServiceNot Vulnerable
Pulse Secure Mobile (Android and iOS)Not Vulnerable
Odyssey Access ClientNot Vulnerable
SBR Enterprise EditionNot Vulnerable
*As long as the client operating system is patched to resolve the ghost issue

Document history:
Jan. 28th, 2015 01:00PM PT- Initial document posting
Jan. 28th, 2015 02:30PM PT- Updated product information
Mar. 8th, 2015 11:45AM PT- Updated product status
Mar. 25th, 2015 09:00AM PT - Updated Network Connect for Linux and SBR Enterprise Edition status.
Workaround
Implementation
Related Links
CVSS Score
Risk Assessment
Acknowledgements
Alert TypePSN - Product Support Notification
Risk LevelMedium
Attachment 1 
Attachment 2 
Legacy IDTSB16618

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255