gethostbyname() GHOST Buffer Overflow
During a code audit performed internally at Qualys, we discovered a buffer overflow in the __nss_hostname_digits_dots() function of the GNU C Library (glibc). This bug is reachable both locally and remotely via the gethostbyname*() functions, so we decided to analyze it — and its
impact — thoroughly, and named this vulnerability “GHOST”.
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
https://www.qualys.com/research/security-advisories/exim_ghost_bof.rb