CVE-2015-7547
Summary
| CVE | CVE-2015-7547 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-02-18 21:59:00 UTC |
| Updated | 2023-02-12 23:15:00 UTC |
| Description | Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.10 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Analytics | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Analytics | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Security Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Security Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Domain Name System | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Domain Name System | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Link Controller | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Link Controller | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | 12.0.0 | All | All | All |
| Application | Gnu | Glibc | 2.10 | All | All | All |
| Application | Gnu | Glibc | 2.10.1 | All | All | All |
| Application | Gnu | Glibc | 2.11 | All | All | All |
| Application | Gnu | Glibc | 2.11.1 | All | All | All |
| Application | Gnu | Glibc | 2.11.2 | All | All | All |
| Application | Gnu | Glibc | 2.11.3 | All | All | All |
| Application | Gnu | Glibc | 2.12 | All | All | All |
| Application | Gnu | Glibc | 2.12.1 | All | All | All |
| Application | Gnu | Glibc | 2.12.2 | All | All | All |
| Application | Gnu | Glibc | 2.13 | All | All | All |
| Application | Gnu | Glibc | 2.14 | All | All | All |
| Application | Gnu | Glibc | 2.14.1 | All | All | All |
| Application | Gnu | Glibc | 2.15 | All | All | All |
| Application | Gnu | Glibc | 2.16 | All | All | All |
| Application | Gnu | Glibc | 2.17 | All | All | All |
| Application | Gnu | Glibc | 2.18 | All | All | All |
| Application | Gnu | Glibc | 2.19 | All | All | All |
| Application | Gnu | Glibc | 2.20 | All | All | All |
| Application | Gnu | Glibc | 2.21 | All | All | All |
| Application | Gnu | Glibc | 2.22 | All | All | All |
| Application | Gnu | Glibc | 2.9 | All | All | All |
| Application | Gnu | Glibc | 2.10 | All | All | All |
| Application | Gnu | Glibc | 2.10.1 | All | All | All |
| Application | Gnu | Glibc | 2.11 | All | All | All |
| Application | Gnu | Glibc | 2.11.1 | All | All | All |
| Application | Gnu | Glibc | 2.11.2 | All | All | All |
| Application | Gnu | Glibc | 2.11.3 | All | All | All |
| Application | Gnu | Glibc | 2.12 | All | All | All |
| Application | Gnu | Glibc | 2.12.1 | All | All | All |
| Application | Gnu | Glibc | 2.12.2 | All | All | All |
| Application | Gnu | Glibc | 2.13 | All | All | All |
| Application | Gnu | Glibc | 2.14 | All | All | All |
| Application | Gnu | Glibc | 2.14.1 | All | All | All |
| Application | Gnu | Glibc | 2.15 | All | All | All |
| Application | Gnu | Glibc | 2.16 | All | All | All |
| Application | Gnu | Glibc | 2.17 | All | All | All |
| Application | Gnu | Glibc | 2.18 | All | All | All |
| Application | Gnu | Glibc | 2.19 | All | All | All |
| Application | Gnu | Glibc | 2.20 | All | All | All |
| Application | Gnu | Glibc | 2.21 | All | All | All |
| Application | Gnu | Glibc | 2.22 | All | All | All |
| Application | Gnu | Glibc | 2.9 | All | All | All |
| Application | Hp | Helion Openstack | 1.1.1 | All | All | All |
| Application | Hp | Helion Openstack | 2.0.0 | All | All | All |
| Application | Hp | Helion Openstack | 2.1.0 | All | All | All |
| Application | Hp | Helion Openstack | 1.1.1 | All | All | All |
| Application | Hp | Helion Openstack | 2.0.0 | All | All | All |
| Application | Hp | Helion Openstack | 2.1.0 | All | All | All |
| Application | Hp | Server Migration Pack | 7.5 | All | All | All |
| Application | Hp | Server Migration Pack | 7.5 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.2 | All | All | All |
| Operating System | Opensuse | Opensuse | 13.2 | All | All | All |
| Application | Oracle | Exalogic Infrastructure | 1.0 | All | All | All |
| Application | Oracle | Exalogic Infrastructure | 2.0 | All | All | All |
| Application | Oracle | Exalogic Infrastructure | 1.0 | All | All | All |
| Application | Oracle | Exalogic Infrastructure | 2.0 | All | All | All |
| Operating System | Oracle | Fujitsu M10 Firmware | All | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Hpc Node | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Hpc Node | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Hpc Node Eus | 7.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Hpc Node Eus | 7.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.2 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
| Application | Sophos | Unified Threat Management Software | 9.319 | All | All | All |
| Application | Sophos | Unified Threat Management Software | 9.355 | All | All | All |
| Application | Sophos | Unified Threat Management Software | 9.319 | All | All | All |
| Application | Sophos | Unified Threat Management Software | 9.355 | All | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11.0 | sp2 | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11.0 | sp3 | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11.0 | sp4 | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11.0 | sp2 | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11.0 | sp3 | All | All |
| Application | Suse | Linux Enterprise Debuginfo | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 12 | All | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 12 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 12 | All | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 12 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp2 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Server | 12 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp2 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Server | 12 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 12 | All | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 12 | sp1 | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 11.0 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 11.0 | sp4 | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 12 | All | All | All |
| Operating System | Suse | Linux Enterprise Software Development Kit | 12 | sp1 | All | All |
| Operating System | Suse | Suse Linux Enterprise Server | 12 | All | All | All |
| Operating System | Suse | Suse Linux Enterprise Server | 12 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Oracle Critical Patch Update Advisory - April 2016 | CONFIRM | www.oracle.com | Patch, Third Party Advisory |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Vulnerability Note VU#457759 - glibc vulnerable to stack buffer overflow in DNS resolver | CERT-VN | www.kb.cert.org | |
| '[security bulletin] HPSBGN03549 rev.1 - HP IceWall Products using glibc, Remote Denial of Service (D' - MARC | HP | marc.info | |
| [security-announce] openSUSE-SU-2016:0512-1: critical: Security update f | SUSE | lists.opensuse.org | Third Party Advisory |
| [security-announce] SUSE-SU-2016:0470-1: important: Security update for | SUSE | lists.opensuse.org | Third Party Advisory |
| CVE-2015-7547 - Red Hat Customer Portal | MISC | access.redhat.com | |
| Bug 1293532 – CVE-2015-7547 glibc: getaddrinfo stack-based buffer overflow | CONFIRM | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| UTM Up2Date 9.355 released | Sophos Blog | CONFIRM | blogs.sophos.com | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | Third Party Advisory |
| GNU glibc 'getaddrinfo()' Function Multiple Stack Buffer Overflow Vulnerabilities | BID | www.securityfocus.com | |
| Citrix Security Advisory for glibc Vulnerability CVE-2015-7547 | CONFIRM | support.citrix.com | |
| [SECURITY] Fedora 22 Update: glibc-2.21-11.fc22 | FEDORA | lists.fedoraproject.org | |
| glibc getaddrinfo Stack-Based Buffer Overflow ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| UTM Up2Date 9.319 released | Sophos Blog | CONFIRM | blogs.sophos.com | Third Party Advisory |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| [R1] Portable SDK for UPnP Devices (libupnp) glibc Implementation getaddrinfo() Function Remote Stack Overflow - Research Advisory | Tenable® | MISC | www.tenable.com | |
| McAfee KnowledgeBase - Intel Security - Security Bulletin: glibc vulnerabilities CVE-2015-5229 and CVE-2015-7547 | CONFIRM | kc.mcafee.com | Third Party Advisory |
| [SECURITY] Fedora 23 Update: glibc-2.22-9.fc23 | FEDORA | lists.fedoraproject.org | |
| Moxa Command Injection / Cross Site Scripting / Vulnerable Software ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Siemens Industrial Products glibc Library Vulnerability (Update C) | ICS-CERT | MISC | ics-cert.us-cert.gov | |
| Oracle Critical Patch Update - January 2018 | CONFIRM | www.oracle.com | |
| Page Not Found - Lenovo Support US | CONFIRM | support.lenovo.com | |
| Full Disclosure: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X | FULLDISC | seclists.org | |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| Red Hat Customer Portal | MISC | access.redhat.com | |
| Cisco Device Hardcoded Credentials / GNU glibc / BusyBox ≈ Packet Storm | MISC | packetstormsecurity.com | |
| USN-2900-1: GNU C Library vulnerability | Ubuntu | UBUNTU | ubuntu.com | Third Party Advisory |
| [security-announce] SUSE-SU-2016:0472-1: important: Security update for | SUSE | lists.opensuse.org | Third Party Advisory |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| 18665 – (CVE-2015-7547) In send_dg, the recvfrom function is NOT always using the buffer size of a newly created buffer (CVE-2015-7547) | CONFIRM | sourceware.org | Issue Tracking |
| Carlos O'Donell - [PATCH] CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflo | MLIST | sourceware.org | Mailing List, Vendor Advisory |
| Bugtraq: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X | BUGTRAQ | seclists.org | |
| Security Advisory - GNU Glibc Buffer Overflow Security Vulnerability | CONFIRM | www.huawei.com | |
| [security-announce] openSUSE-SU-2016:0511-1: critical: Security update f | SUSE | lists.opensuse.org | Third Party Advisory |
| Glibc getaddrinfo() Stack Overflow Lets Remote or Local Users Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Debian -- Security Information -- DSA-3481-1 glibc | DEBIAN | www.debian.org | Third Party Advisory |
| '[security bulletin] HPSBGN03547 rev.1 - HPE Helion Eucalyptus Node Controller and other Helion Eucal' - MARC | HP | marc.info | |
| GNU C Library: Multiple vulnerabilities (GLSA 201602-02) — Gentoo Security | GENTOO | security.gentoo.org | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | |
| Broadcom Support Portal | CONFIRM | bto.bluecoat.com | Third Party Advisory |
| Google Online Security Blog: CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow | MISC | googleonlinesecurity.blogspot.com | |
| [security-announce] SUSE-SU-2016:0473-1: important: Security update for | SUSE | lists.opensuse.org | Third Party Advisory |
| Nexans FTTO GigaSwitch Outdated Components / Hardcoded Backdoor ≈ Packet Storm | MISC | packetstormsecurity.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| SOL47098834 - glibc vulnerability CVE-2015-7547 | CONFIRM | support.f5.com | Third Party Advisory |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| Public KB - SA40161 - [Pulse Secure] glibc getaddrinfo stack-based buffer overflow (CVE-2015-7547) | CONFIRM | kb.pulsesecure.net | Third Party Advisory |
| [security-announce] openSUSE-SU-2016:0510-1: important: Security update | SUSE | lists.opensuse.org | Third Party Advisory |
| '[security bulletin] HPSBGN03442 rev.1 - HP Helion OpenStack using glibc, Remote Denial of Service (D' - MARC | HP | marc.info | |
| StruxureWare Data Center Operation Software Vulnerability Fixes - User Assistance for StruxureWare Data Center Operation 8 - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz | CONFIRM | help.ecostruxureit.com | |
| FortiGuard | CONFIRM | www.fortiguard.com | |
| CVE-2015-7547 GNU C Library (glibc) Vulnerability in Multiple NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| '[security bulletin] HPSBGN03582 rev.1 - HPE Helion CloudSystem using glibc, Remote Code Execution, D' - MARC | HP | marc.info | |
| Critical security flaw: glibc stack-based buffer overflow in getaddrinfo() (CVE-2015-7547) - Red Hat Customer Portal | CONFIRM | access.redhat.com | Third Party Advisory |
| Arista - Security Advisory 0017 | MISC | www.arista.com | |
| Oracle Linux Bulletin - January 2016 | CONFIRM | www.oracle.com | |
| Full Disclosure: SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices | FULLDISC | seclists.org | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| glibc - 'getaddrinfo' Remote Stack Buffer Overflow | EXPLOIT-DB | www.exploit-db.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| FortiGuard | CONFIRM | fortiguard.com | |
| '[security bulletin] HPSBGN03551 rev.1 - HPE Helion Development Platform using glibc, Remote Denial o' - MARC | HP | marc.info | |
| VMSA-2016-0002 | United States | CONFIRM | www.vmware.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| glibc - getaddrinfo Stack-Based Buffer Overflow | EXPLOIT-DB | www.exploit-db.com | |
| [security-announce] SUSE-SU-2016:0471-1: important: Security update for | SUSE | lists.opensuse.org | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| Debian -- Security Information -- DSA-3480-1 eglibc | DEBIAN | www.debian.org | |
| Red Hat Customer Portal | REDHAT | rhn.redhat.com | |
| Full Disclosure: SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series | FULLDISC | seclists.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 43886 Huawei Router and Switch Buffer Overflow Vulnerability (Huawei-SA-20160304-01-glibc-en)