Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-0235 PoC — GNU glibc 基于堆的缓冲区错误漏洞

Source
Associated Vulnerability
Title:GNU glibc 基于堆的缓冲区错误漏洞 (CVE-2015-0235)
Description:Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
Description
Ansible playbook to check vulnerability for CVE-2015-0235
Readme
# CVE-2015-0235-test
Ansible playbook to **check vulnerability** for [CVE-2015-0235](http://www.openwall.com/lists/oss-security/2015/01/27/9). This is based on the test program provided by the University of Chigago ([link](https://itservices.uchicago.edu/page/ghost-vulnerability)). Ansible will allow you to specify a large number of host machines to test at once.

**This does not patch or restart anything**, it only reports if your systems are affected.

Assumes `gcc` is installed remotely.

# Note!
Please don't just arbitrarily run this on your hosts, read the code first to see what it does :)

## Usage
Requires ansible. Change the `user: your_remote_user` in `ghost.yml:2` to match your remote system(s).

```
pip install ansible
ansible-playbook -i hosts_to_test ghost.yml
```

## Sample output
```
af:ghost aaronfay$ ansible-playbook ghost.yml -i aaron_host

PLAY [all] ******************************************************************** 

GATHERING FACTS *************************************************************** 
ok: [foobar.com]

TASK: [copy the GHOST script to the machine] ********************************** 
ok: [foobar.com]

TASK: [compile it] ************************************************************ 
ok: [foobar.com]

TASK: [run it!] *************************************************************** 
ok: [foobar.com]

TASK: [show me the results] *************************************************** 
ok: [foobar.com] => {
    "ghost.stdout_lines[0]": "vulnerable"
}

PLAY RECAP ******************************************************************** 
foobar.com                 : ok=5    changed=0    unreachable=0    failed=0   
```
File Snapshot

[4.0K] /data/pocs/9cfa24031085799ffd7eedd1d92e38d8981094b6 ├── [1.0K] GHOST.c ├── [ 614] ghost.yml ├── [ 59] hosts_to_test └── [1.6K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →