Actions

GHOST: Difference between revisions

(Initial page)
 
(Fixed vulnerability script)
Line 49: Line 49:
* login with root account
* login with root account
* execute the following to create a test script
* execute the following to create a test script
  cat >> rhel-GHOST-test.sh << FOF
  cat > rhel-GHOST-test.sh << FOF
  #!/bin/bash
  #!/bin/bash
  # rhel-GHOST-test.sh -  GHOST vulnerability tester. Only for CentOS/RHEL based servers.  #
  # rhel-GHOST-test.sh -  GHOST vulnerability tester. Only for CentOS/RHEL based servers.  #
Line 57: Line 57:
   
   
  rv=0
  rv=0
  for glibc_nvr in $( rpm -q --qf '%{name}-%{version}-%{release}.%{arch}\n' glibc ); do
  for glibc_nvr in \$( rpm -q --qf '%{name}-%{version}-%{release}.%{arch}\n' glibc ); do
     glibc_ver=$( echo "$glibc_nvr" | awk -F- '{ print $2 }' )
     glibc_ver=\$( echo "\$glibc_nvr" | awk -F- '{ print \$2 }' )
     glibc_maj=$( echo "$glibc_ver" | awk -F. '{ print $1 }')
     glibc_maj=\$( echo "\$glibc_ver" | awk -F. '{ print \$1 }')
     glibc_min=$( echo "$glibc_ver" | awk -F. '{ print $2 }')
     glibc_min=\$( echo "\$glibc_ver" | awk -F. '{ print \$2 }')
   
   
     echo -n "- $glibc_nvr: "
     echo -n "- \$glibc_nvr: "
     if [ "$glibc_maj" -gt 2   -o \
     if [ "\$glibc_maj" -gt 2 -o \( "\$glibc_maj" -eq 2  -a  "\$glibc_min" -ge 18 \) ]; then
        \( "$glibc_maj" -eq 2  -a  "$glibc_min" -ge 18 \) ]; then
         # fixed upstream version
         # fixed upstream version
         echo 'not vulnerable'
         echo 'not vulnerable'
     else
     else
         # all RHEL updates include CVE in rpm %changelog
         # all RHEL updates include CVE in rpm %changelog
         if rpm -q --changelog "$glibc_nvr" | grep -q 'CVE-2015-0235'; then
         if rpm -q --changelog "\$glibc_nvr" | grep -q 'CVE-2015-0235'; then
             echo "not vulnerable"
             echo "not vulnerable"
         else
         else
Line 78: Line 77:
  done
  done
   
   
  if [ $rv -ne 0 ]; then
  if [ \$rv -ne 0 ]; then
     cat <<EOF
     cat <<EOF
   
   
  This system is vulnerable to CVE-2015-0235. <https://access.redhat.com/security/cve/CVE-2015-0235>
This system is vulnerable to CVE-2015-0235. <https://access.redhat.com/security/cve/CVE-2015-0235>
  Please refer to <https://access.redhat.com/articles/1332213> for remediation steps
Please refer to <https://access.redhat.com/articles/1332213> for remediation steps
  EOF
EOF
  fi
  fi
   
   
  exit $rv
  exit \$rv
  FOF
  FOF
* Execute the script
* Execute the script

Revision as of 10:56, 3 February 2015


On January 27, 2015, a vulnerability named "GHOST" in the glibc library was publicly announced. GHOST is also referred as CVE-2015-0235. The vulnerability is a buffer overflow in the gethostbyname family of functions that can allow arbitrary code execution.

Affected Products

  • TMG800, TMG3200, TMG7800-CTRL
  • Tdev Linux server with (CentOS, RedHat, etc) running Toolpack software

Details

The impact of this vulnerability on TelcoBridges products depends on their configuration. The vulnerability may only be triggered through requests for domain name resolution. Therefore, only units that enable such services may be exposed to the issue.

Software Versions and Fixes

The TelcoBridges CentOS 5 repository has been updated with the latest glibc version. Services that use glibc must be restarted. Because glibc is thoroughly used in the Linux operating system, it is highly recommended to reboot the unit.

Update procedure

  • login with root account
[root@TB011107 ~]# uname -m
x86_64

Command line interface - TMG unit or Linux server with access to Internet (i.e. with DNS configured)

  • login with root account
  • update OS packages with yum
yum clean all
yum update
  • reboot the unit
reboot

TMG unit or Linux server without access to Internet

yum localinstall glibc-2.5-123.el5_11.1.x86_64.rpm \
  glibc-common-2.5-123.el5_11.1.x86_64.rpm \
  glibc-devel-2.5-123.el5_11.1.x86_64.rpm \
  glibc-headers-2.5-123.el5_11.1.x86_64.rpm \
  nscd-2.5-123.el5_11.1.x86_64.rpm
  • Note: that operation might take a long time since yum will probably experience timeouts when trying to access the external repositories.
  • Reboot the unit
reboot

How to verify if the vulnerability is fixed?

  • login with root account
  • execute the following to create a test script
cat > rhel-GHOST-test.sh << FOF
#!/bin/bash
# rhel-GHOST-test.sh -  GHOST vulnerability tester. Only for CentOS/RHEL based servers.  #
# Version 3
# Credit : Red Hat, Inc - https://access.redhat.com/labs/ghost/ #
echo "Installed glibc version(s)"

rv=0
for glibc_nvr in \$( rpm -q --qf '%{name}-%{version}-%{release}.%{arch}\n' glibc ); do
    glibc_ver=\$( echo "\$glibc_nvr" | awk -F- '{ print \$2 }' )
    glibc_maj=\$( echo "\$glibc_ver" | awk -F. '{ print \$1 }')
    glibc_min=\$( echo "\$glibc_ver" | awk -F. '{ print \$2 }')

    echo -n "- \$glibc_nvr: "
    if [ "\$glibc_maj" -gt 2 -o \( "\$glibc_maj" -eq 2  -a  "\$glibc_min" -ge 18 \) ]; then
        # fixed upstream version
        echo 'not vulnerable'
    else
        # all RHEL updates include CVE in rpm %changelog
        if rpm -q --changelog "\$glibc_nvr" | grep -q 'CVE-2015-0235'; then
            echo "not vulnerable"
        else
            echo "vulnerable"
            rv=1
        fi
    fi
done

if [ \$rv -ne 0 ]; then
    cat <<EOF

This system is vulnerable to CVE-2015-0235. <https://access.redhat.com/security/cve/CVE-2015-0235>
Please refer to <https://access.redhat.com/articles/1332213> for remediation steps
EOF
fi

exit \$rv

FOF
  • Execute the script
chmod +x rhel-GHOST-test.sh
./rhel-GHOST-test.sh
  • You should not see the 'vulnerable' string displayed

References