Network Management

last person joined: yesterday 

Keep an informative eye on your network with HPE Aruba Networking network management solutions
Expand all | Collapse all

GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

This thread has been viewed 0 times
  • 1.  GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Jan 28, 2015 10:36 AM

    Do we know if this affects Airwave in any way?



  • 2.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Jan 28, 2015 12:39 PM

    same question for ArubaOS, Instant and ClearPass i would say.



  • 3.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    EMPLOYEE
    Posted Jan 28, 2015 04:00 PM

    We have had our engineering teams looking at this since yesterday, and hope to have a statement ready by the end of the week.  If you read the original advisory, you know that it's a bit complicated and there are various mitigations that can make this a non-issue in some cases.  We're going through to determine whether the problem is exploitable on any of our products.

     

    For AirWave specifically, you can preemptively apply a patch without waiting for our analysis.  Login to a root shell and execute "yum update glibc" - you'll get the RedHat updated version that way.  



  • 4.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    EMPLOYEE
    Posted Jan 30, 2015 01:11 PM

    At this point in our analysis, our conclusion is that no Aruba product is affected by this.  We'll update the C library in the next feasible maintenace release just to be safe, but we have gone through all of the relevant code and concluded that there's no way to trigger the vulnerability today.



  • 5.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Jan 30, 2015 01:13 PM
    Will be there be a security advisory sent out explaining that this isn't an issue?


  • 6.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    EMPLOYEE
    Posted Jan 30, 2015 01:19 PM

    I am really trying not to send out advisories for things that are NOT an actual vulnerability.  It seems to be difficult enough to get people to pay attention to the advisories that ARE problems - I worry that if we start notifying people when things aren't broken, it will get even worse.  It also sets a precedent - where do we draw the line on what we send out?  There's quite a bit of open-source code used by Aruba products.  Do we send notifications any time one of them has a vulnerability that doesn't affect us?

     

    I'm open to suggestions on this.. any feedback from the community?



  • 7.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Jan 30, 2015 01:28 PM
    Thanks Jon. No worries just curious as I have been asked to report back to the customer whether this is a problem or not hence why I asked if a statement would go out.


  • 8.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Jan 30, 2015 02:36 PM

     Once Aruba sets a precedent it is harder to change. I am of the same mind as Jon in not reacting to issues that in fact, are non-issues for Aruba products. I deal with within Aruba's Partner community each time there is an vulnerability annouced.

     

    George Anderson

    Aruba Channel Enablement Engineer



  • 9.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Feb 02, 2015 12:33 PM

    I do not agree. The Airwave platform is using a vulnerable version of GLIBC. The questions are: is that vulnerability currently exploitable and how soon will the vulnerability be patched. I would expect Aruba support to issue a statement informing the user base how exposed the current system is to an actual exploit and what is being done to update the software, even if that statement is "Airwave is not currently exploitable and an updated GLIBC will be included in a future maitenece upgrade".



  • 10.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Feb 04, 2015 11:45 AM

    William Thompson, I agree totally.  It is the minimum that I would expect from any vendor.  I am being asked by management which systems are affected by this vulneralbility and can find no information on Aruba's website.  Cisco's website, however, has all the information I would need to find out which products are affected and what actions are being taken to address the vulnerability.  Will anyone at Aruba step up to the plate?



  • 11.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    EMPLOYEE
    Posted Feb 04, 2015 12:24 PM

    We talked this over.  Given the number of "popular" vulnerabilities in the last year (the ones that get their own names and which make it into the mainstream news) it does make sense to publish information on these.  I have a request in to our website team to create a new section that I can use for this purpose.  Will update back on this thread once that is done.



  • 12.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Feb 04, 2015 12:35 PM

    I must say I am pleasantly surprised!  Thank you for the quick response Jon!



  • 13.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Feb 17, 2016 04:26 PM

    Is there any update on when we might see an official statement?

     

    Thanks!



  • 14.  RE: GHOST: glibc gethostbyname buffer overflow - CVE-2015-0235

    Posted Feb 22, 2016 02:36 PM

    on what exactly, ghost 1.0 or ghost 2.0?

     

    1.0 is explained above.

     

    2.0 is mentioned here: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2016-001-glibc.txt