F5 Sites
  • F5.com
  • LearnF5
  • NGINX
  • MyF5
  • Partner Central
Contact
  • Under Attack?
  • F5 Support
  • DevCentral Support
  • F5 Sales
  • NGINX Sales
  • F5 Professional Services
Skip to contentBrand Logo
Forums
CrowdSRC
Articles
GroupsEventsSuggestionsHow Do I...?
RegisterSign In
  1. DevCentral
  2. Articles
  3. Technical Articles

GHOST Vulnerability (CVE-2015-0235)

On 27 of January Qualys published a critical vulnerability dubbed “GHOST” as it can be triggered by the GetHOST functions ( gethostbyname*() ) of the glibc library shipping with the Linux kernel. Gli...
Updated Jun 06, 2023
Version 2.0
application security
ASM Advanced WAF
cve-2015-0235
exim
exploit
ghost
irule
security
vulnerability
Maxim_Zavodchik's avatar
Maxim_Zavodchik
Historic F5 Account
Joined May 04, 2019
View Profile
hoolio's avatar
hoolio
Icon for Cirrostratus rankCirrostratus
Jan 30, 2015

Here's an optimization to the iRule: 

when CLIENT_ACCEPTED { 
    TCP::collect 
} 
when CLIENT_DATA { 
    switch -- [string toupper [TCP::payload 5]] {
        "HELO " - 
        "EHLO " { 
            if {[TCP::payload length] > 1000 ) } { 
                log local0. "Detected GHOST exploitation attempt" 
                TCP::close return 
            } 
        }
    }
    TCP::release 
    TCP::collect 
}

ABOUT DEVCENTRAL

DevCentral NewsTechnical ForumTechnical ArticlesTechnical CrowdSRCCommunity GuidelinesDevCentral EULAGet a Developer Lab LicenseBecome a DevCentral MVP

RESOURCES

Product DocumentationWhite PapersGlossaryCustomer StoriesWebinarsFree Online CoursesF5 CertificationLearnF5 Training

SUPPORT

Manage SubscriptionsProfessional ServicesProfessional ServicesCreate a Service RequestSoftware DownloadsSupport Portal

PARTNERS

Find a Reseller PartnerTechnology AlliancesBecome an F5 PartnerLogin to Partner Central

F5 logo©2024 F5, Inc. All rights reserved.
TrademarksPoliciesPrivacyCalifornia PrivacyDo Not Sell My Personal Information