Skip to content

Remote Exploitation of GHOST Vulnerability through Remote Code Execution

Remote code execution vulnerability found in Linux systems through Ghost exploit. Here's how to deal with the issue and fortify your network against possible dangers.

Remote Exploitation of Ghost Vulnerability through Remote Code Execution
Remote Exploitation of Ghost Vulnerability through Remote Code Execution

Remote Exploitation of GHOST Vulnerability through Remote Code Execution

The cybersecurity community has been abuzz with the release of a new exploit for the infamous Exim GHOST vulnerability. This exploit, now available as a standalone file, can be imported into Metasploit, making it easier for security researchers and ethical hackers to test systems for potential vulnerabilities.

The Exim GHOST vulnerability, first discovered in 2015, is a heap-based buffer overflow in the GNU C Library's gethostbyname functions. It has been a significant concern for many as it can be exploited remotely via all the gethostbyname*() functions, potentially leading to remote code execution.

The first exploitable version of the Exim mail server is exim-4.77, and the vulnerability was initially found in the GNU C Library version 2.6, released in 2000. The last exploitable version is glibc-2.17, and the bug was fixed on May 21, 2013, between the releases of glibc-2.17 and glibc-2.18.

However, it's important to note that this updated Metasploit exploit is not designed to work with client-side requirements that do not have a reliable sender_host_name variable set in Exim. It also requires the IPv4 address to have both forward and reverse DNS entries that match each other (Forward-Confirmed reverse DNS).

Qualys, a leading provider of cloud-based security and compliance solutions, released an advisory and a blog post on January 27, 2015. They held the Metasploit module until now to allow IT teams time to apply all necessary patches. The Metasploit module primarily affects older versions of the Exim mail server, notably versions before Exim 4.82. Vulnerable Linux distributions include outdated releases of Debian, Ubuntu, and CentOS that ship with these Exim versions.

To add the updated Metasploit exploit to the Metasploit Framework, simply copy the file to the modules/exploits/linux/smtp/ directory. The exploit's URL for download is: https://www.oursocials.com/research/security-advisories/exim_ghost_bof.rb.

It's crucial to remember that while this exploit can be a valuable tool for testing and securing systems, it should only be used responsibly and ethically. Always ensure that you have permission to test systems and that you are following all relevant laws and regulations.

In conclusion, the new Metasploit exploit for the Exim GHOST vulnerability provides a valuable resource for security researchers and IT teams. However, it's essential to understand its limitations and use it responsibly to ensure the safety and security of all systems involved.

Read also:

Latest