Ghost Linux vulnerability can be exploited through WordPress, other PHP apps

A critical vulnerability in glibc, a core Linux library, can be exploited remotely through WordPress and likely other PHP applications to compromise Web servers.

The buffer overflow vulnerability, dubbed Ghost, was reported Tuesday by researchers from security vendor Qualys. It is identified as CVE-2015-0235 in the Common Vulnerabilities and Exposures database.

The bug is located in the gethostbyname*() functions of the glibc (GNU C Library) version 2.17 and older. It was fixed in glibc-2.18, released in May 2013, but it wasn’t flagged as a security vulnerability at the time.

To read this article in full or to leave a comment, please click here

Read more: Ghost Linux vulnerability can be exploited through WordPress, other PHP apps

Story added 30. January 2015, content source with full text you can find at link above.