Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Big-ip Access Policy Manager Subscribe
Big-ip Advanced Firewall Manager Subscribe
Big-ip Analytics Subscribe
Big-ip Application Acceleration Manager Subscribe
Big-ip Application Security Manager Subscribe
Big-ip Domain Name System Subscribe
Big-ip Link Controller Subscribe
Big-ip Local Traffic Manager Subscribe
Big-ip Policy Enforcement Manager Subscribe
Helion Openstack Subscribe
Server Migration Pack Subscribe
Opensuse Subscribe
Opensuse Subscribe
Exalogic Infrastructure Subscribe
Fujitsu M10 Firmware Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Hpc Node Subscribe
Enterprise Linux Hpc Node Eus Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server Eus Subscribe
Enterprise Linux Workstation Subscribe
Rhel Aus Subscribe
Rhel Eus Subscribe
Rhel Mission Critical Subscribe
Unified Threat Management Software Subscribe
Linux Enterprise Debuginfo Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise Server Subscribe
Linux Enterprise Software Development Kit Subscribe
Suse Linux Enterprise Server Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-416-1 eglibc security update
Debian DSA Debian DSA DSA-3480-1 eglibc security update
Debian DSA Debian DSA DSA-3481-1 glibc security update
Ubuntu USN Ubuntu USN USN-2900-1 GNU C Library vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145596041017029&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145672440608228&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145690841819314&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145857691004892&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=146161017210491&w=2 cve-icon cve-icon
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html cve-icon cve-icon
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html cve-icon cve-icon
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html cve-icon cve-icon
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0175.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0176.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0225.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0277.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/Sep/7 cve-icon cve-icon
http://seclists.org/fulldisclosure/2021/Sep/0 cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/Jun/36 cve-icon cve-icon
http://support.citrix.com/article/CTX206991 cve-icon cve-icon
http://ubuntu.com/usn/usn-2900-1 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3480 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3481 cve-icon cve-icon
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html cve-icon cve-icon
http://www.securityfocus.com/bid/83265 cve-icon cve-icon
http://www.securitytracker.com/id/1035020 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2016-0002.html cve-icon cve-icon
https://access.redhat.com/articles/2161461 cve-icon cve-icon cve-icon
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ cve-icon cve-icon
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ cve-icon cve-icon
https://bto.bluecoat.com/security-advisory/sa114 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1293532 cve-icon cve-icon
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 cve-icon cve-icon
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10150 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-7547 cve-icon
https://seclists.org/bugtraq/2019/Sep/7 cve-icon cve-icon
https://security.gentoo.org/glsa/201602-02 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20160217-0002/ cve-icon cve-icon
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 cve-icon cve-icon
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html cve-icon cve-icon
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html cve-icon cve-icon
https://support.lenovo.com/us/en/product_security/len_5450 cve-icon cve-icon
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-7547 cve-icon
https://www.exploit-db.com/exploits/39454/ cve-icon cve-icon
https://www.exploit-db.com/exploits/40339/ cve-icon cve-icon
https://www.kb.cert.org/vuls/id/457759 cve-icon cve-icon
https://www.tenable.com/security/research/tra-2017-08 cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T07:51:28.440Z

Reserved: 2015-09-29T00:00:00

Link: CVE-2015-7547

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-02-18T21:59:00.120

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-7547

cve-icon Redhat

Severity : Critical

Publid Date: 2016-02-16T00:00:00Z

Links: CVE-2015-7547 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses