uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites,’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.


Detecting the GHOST glibc Vulnerability with Unified VRM

In the previous blog post here, we described the GHOST Linux glibc vulnerability in details and its repercussions to the affected systems in terms of risk.

NopSec Unified VRM helps identify the Linux GHOST glibc vulnerabilities in various flavors of Linux, performing authenticated scans. Furthermore, Linux authenticated scan can be performed using SSH through username / password and certificate as well.

ghost blog

The following Linux platforms have now vulnerability checks for detecting the Linux GHOST vulnerability:

All vulnerable flavors of Ubuntu;

CentOS 5,6, and 7;



To better detect the vulnerability, create a custom scan template, enable SYN Scan for all the privileges TCP ports, enable SSH authenticated check and enter credentials or certificate. Then search for only the CVE-2015-0235 vulnerabilities checks. Enable silent dependencies and all other checks will be automatically selected.

Save the scan template and then use it in an authenticated scan against a range of internal IP addresses.

Happy GHOST hunting!!

Schedule a Product Demo Today!

See how NopSec's security insights and cyber threat exposure management platform can organize your security chaos.