2015å¹´1æ27æ¥(ç¾å°æé) Qualysã¯glibc(GNU C Library)ã«èå¼±æ§ãçºè¦ããæ å ±ãå ¬éãã¾ãããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã(æ«å®ã¾ã¨ããªã®ã§ç²¾åº¦ä½ããç¶²ç¾ æ§ç¡ãã§ããã) (1) èå¼±æ§é¢é£æ å ± Qualysãå ¬éããèå¼±æ§æ å ± The GHOST Vulnerability Qualys Security Advisory CVE-2015-0235 注æåèµ· IPA (注æ) libc ã®èå¼±æ§å¯¾çã«ã¤ãã¦(CVE-2015-0235) èå¼±æ§ã®æ¦è¦ glibcã®__nss_hostname_digits_dots() ã«ãã¼ããããã¡ãªã¼ãã¼ããã¼ã®èå¼±æ§ã å½è©²é¢æ°ã¯glibcã®gethostbyname()ã¨gethostbyname2()ããå¼ã°ãã¦ããã ã¢ããªã±ã¼ã·ã§ã³ã«ãã£ã¦ã¯ãDoSãã¾ãã¯ãªã¢ã¼ãããä»»æã®ã³ã¼ããå®è¡å¯è½ã¨ãªãå¯è½æ§
Re: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow From: Qualys Security Advisory <qsa () qualys com> Date: Tue, 27 Jan 2015 10:20:20 -0800 On Tue, Jan 27, 2015 at 09:20:21AM -0800, Michal Zalewski wrote: Nice work - thanks for the thoroughly investigated and detailed advisory. Thank you very much. We also sincerely regret that some information about this vulne
glibcã®gethostbynameç³»é¢æ°ã«èå¼±æ§ã®åå ã¨ãªããã°ãçºè¦ããCVE-2015-0235(GHOST)ã¨å½åãããããã§ããæ¾ç½®ããå ´åã¯ç¸å½å¤ãã®ã¢ããªã±ã¼ã·ã§ã³ããã®èå¼±æ§ã®å½±é¿ãåãããã¨ãäºæ³ããã¾ãã glibc㯠libcã®GNUãã¼ã¸ã§ã³ã§ããlibcã¯ã¢ããªã±ã¼ã·ã§ã³ã§ã¯ãªããäºå®ä¸å ¨ã¦ã®ã¢ããªã±ã¼ã·ã§ã³ãå©ç¨ãã¦ããã©ã¤ãã©ãªã§ããOSã®ä¸ã§ã¯ã«ã¼ãã«ã«æ¬¡ãã§éè¦ãªé¨åã¨è¨ãã¾ããLinuxã·ã¹ãã ã§ã¯(ãã¨ãµã¼ãã¼ç¨éã«ããã¦ã¯)ä¾å¤ãªã glibcã使ããã¦ãã¾ãã ãã® glibcã«å«ã¾ãã gethostbynameç³»é¢æ°ã®å®è£ ã« 2000å¹´é ããåå¨ãããã°ãä»ã«ãªã£ã¦çºè¦ãããCVE-2015-0235 é称 GHOSTã¨å½åããã¾ããããããã¯ã¼ã¯ã§ä½ããã®éä¿¡ãè¡ãã¢ããªã±ã¼ã·ã§ã³ã¯å¿ ãâ»ãã®é¢æ°ã使ç¨ãã¾ãã â»è¿½è¨: åå解決ããµãã¼ã
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}