GHOST: Another Security Bug Hits Linux, But is it That Bad?

Heartbleed is not even a year behind us, and the open source world has been hit with another major security vulnerability in the form of GHOST, which involves holes in the Linux glibc library. This time, though, the actual danger may not live up to the hype.

Christopher Tozzi, Contributing Editor

February 4, 2015

2 Min Read
GHOST: Another Security Bug Hits Linux, But is it That Bad?

Heartbleed is not even a year behind us, and the open source world has been hit with another major security vulnerability in the form of GHOST, which involves holes in the Linux glibc library. This time, though, the actual danger may not live up to the hype.

The GHOST vulnerability, which was announced last week by security researchers at Qualys, resides in the gethostbyname*() functions of the glibc library. glibc is one of the core building blocks of most Linux systems, and gethostbyname*(), which resolves domain names into IP addresses, is widely used in open source applications.

Attackers can exploit the GHOST security hole to create a buffer overflow, making it possible to execute any kind of code they want and do all sorts of nasty things.

All of the above suggests that GHOST is bad news indeed. Fortunately for the open source community, however, the actual risk appears small. As TrendMicro points out, the bug that makes the exploit possible has been fixed in glibc since May 2013, meaning that any Linux servers or PCs running more recent versions of the software are safe from attack.

In addition, gethostbyname*() has been superseded by newer glibc functions that can better handle modern networking environments. Those include ones that use the IPv6 protocol, which gethostbyname*() doesn’t support. As a result, newer applications often don’t use the gethostbyname*() functions, and are not at risk.

And perhaps most importantly, there’s currently no known way of executing GHOST attacks through the Web. That greatly reduces opportunities for using this vulnerability to steal the data of unsuspecting users or otherwise wreak havoc.

All in all, then, GHOST doesn’t seem like a vulnerability that will prove as serious as Heartbleed or Shellshock, two other recent security problems that affected widely used open source software.

Read more about:

AgentsMSPsVARs/SIs

About the Author

Christopher Tozzi

Contributing Editor

Christopher Tozzi started covering the channel for The VAR Guy on a freelance basis in 2008, with an emphasis on open source, Linux, virtualization, SDN, containers, data storage and related topics. He also teaches history at a major university in Washington, D.C. He occasionally combines these interests by writing about the history of software. His book on this topic, “For Fun and Profit: A History of the Free and Open Source Software Revolution,” is forthcoming with MIT Press.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like