Description
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Published: 2016-02-18
Score: 8.1 High
EPSS: 94.0% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-416-1 eglibc security update
Debian DSA Debian DSA DSA-3480-1 eglibc security update
Debian DSA Debian DSA DSA-3481-1 glibc security update
Ubuntu USN Ubuntu USN USN-2900-1 GNU C Library vulnerability
References
Link Providers
http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145596041017029&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145672440608228&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145690841819314&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=145857691004892&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=146161017210491&w=2 cve-icon cve-icon
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html cve-icon cve-icon
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html cve-icon cve-icon
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html cve-icon cve-icon
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0175.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0176.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0225.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2016-0277.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2019/Sep/7 cve-icon cve-icon
http://seclists.org/fulldisclosure/2021/Sep/0 cve-icon cve-icon
http://seclists.org/fulldisclosure/2022/Jun/36 cve-icon cve-icon
http://support.citrix.com/article/CTX206991 cve-icon cve-icon
http://ubuntu.com/usn/usn-2900-1 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3480 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3481 cve-icon cve-icon
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow cve-icon cve-icon
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html cve-icon cve-icon
http://www.securityfocus.com/bid/83265 cve-icon cve-icon
http://www.securitytracker.com/id/1035020 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2016-0002.html cve-icon cve-icon
https://access.redhat.com/articles/2161461 cve-icon cve-icon cve-icon
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ cve-icon cve-icon
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ cve-icon cve-icon
https://bto.bluecoat.com/security-advisory/sa114 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1293532 cve-icon cve-icon
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html cve-icon cve-icon
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 cve-icon cve-icon
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 cve-icon cve-icon
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes cve-icon cve-icon
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01 cve-icon cve-icon
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 cve-icon cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10150 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2015-7547 cve-icon
https://seclists.org/bugtraq/2019/Sep/7 cve-icon cve-icon
https://security.gentoo.org/glsa/201602-02 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20160217-0002/ cve-icon cve-icon
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 cve-icon cve-icon
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html cve-icon cve-icon
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html cve-icon cve-icon
https://support.lenovo.com/us/en/product_security/len_5450 cve-icon cve-icon
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2015-7547 cve-icon
https://www.exploit-db.com/exploits/39454/ cve-icon cve-icon
https://www.exploit-db.com/exploits/40339/ cve-icon cve-icon
https://www.kb.cert.org/vuls/id/457759 cve-icon cve-icon
https://www.tenable.com/security/research/tra-2017-08 cve-icon cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Domain Name System Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager
Gnu Glibc
Hp Helion Openstack Server Migration Pack
Opensuse Opensuse
Oracle Exalogic Infrastructure Fujitsu M10 Firmware
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Hpc Node Enterprise Linux Hpc Node Eus Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Eus Enterprise Linux Workstation Rhel Aus Rhel Eus Rhel Mission Critical
Sophos Unified Threat Management Software
Suse Linux Enterprise Debuginfo Linux Enterprise Desktop Linux Enterprise Server Linux Enterprise Software Development Kit Suse Linux Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T07:51:28.440Z

Reserved: 2015-09-29T00:00:00.000Z

Link: CVE-2015-7547

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2016-02-18T21:59:00.120

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-7547

cve-icon Redhat

Severity : Critical

Publid Date: 2016-02-16T00:00:00Z

Links: CVE-2015-7547 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses