The GHOST vulnerability may affect WordPress and PHP applications.
Last week, Glibc found a heap buffer overflow vulnerability called GHOST that can be remotely exploited. The vulnerability has been fixed by the upstream, however, some downstream releases are not patched due to bugs. The affected releases include CentOS/RHEL 5, 6, and 7, as well as Ubuntu 12.04. Currently, security researchers believe that PHP applications may also be affected by this vulnerability. The GHOST vulnerability is related to the call of gethostbyname () and gethostbyname2 (). Researchers believe that attackers may also use PHP applications such as the WordPress gethostbyname () package, embedding malicious URLs to trigger heap buffer overflow on the server may allow attackers to gain access to the server.
Dangerous! GHOST (GHOST) vulnerability exposure
GNU glibc gethostbyname Buffer Overflow Vulnerability
Glibc gethostbyname Buffer Overflow Vulnerability (CVE-2015-0235)
Linux glibc ghost vulnerability test and repair methods