CVE-2015-7547

Summary

CVECVE-2015-7547
StatePUBLISHED
Assignerredhat
Source PriorityCVE Program / NVD first with legacy fallback
Published2016-02-18 21:59:00 UTC
Updated2026-05-06 22:30:45 UTC
DescriptionMultiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Risk And Classification

Primary CVSS: v3.0 8.1 HIGH from [email protected]

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem Types: CWE-119 | n/a


VersionSourceTypeScoreSeverityVector
3.0[email protected]Primary8.1HIGHCVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2.0[email protected]Primary6.8AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3.0 Breakdown

Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0 Breakdown

Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial

AV:N/AC:M/Au:N/C:P/I:P/A:P

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Canonical Ubuntu Linux 12.04 All All All
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 15.10 All All All
Operating System Debian Debian Linux 8.0 All All All
Application F5 Big-ip Access Policy Manager 12.0.0 All All All
Application F5 Big-ip Advanced Firewall Manager 12.0.0 All All All
Application F5 Big-ip Analytics 12.0.0 All All All
Application F5 Big-ip Application Acceleration Manager 12.0.0 All All All
Application F5 Big-ip Application Security Manager 12.0.0 All All All
Application F5 Big-ip Domain Name System 12.0.0 All All All
Application F5 Big-ip Link Controller 12.0.0 All All All
Application F5 Big-ip Local Traffic Manager 12.0.0 All All All
Application F5 Big-ip Policy Enforcement Manager 12.0.0 All All All
Application Gnu Glibc 2.10 All All All
Application Gnu Glibc 2.10.1 All All All
Application Gnu Glibc 2.11 All All All
Application Gnu Glibc 2.11.1 All All All
Application Gnu Glibc 2.11.2 All All All
Application Gnu Glibc 2.11.3 All All All
Application Gnu Glibc 2.12 All All All
Application Gnu Glibc 2.12.1 All All All
Application Gnu Glibc 2.12.2 All All All
Application Gnu Glibc 2.13 All All All
Application Gnu Glibc 2.14 All All All
Application Gnu Glibc 2.14.1 All All All
Application Gnu Glibc 2.15 All All All
Application Gnu Glibc 2.16 All All All
Application Gnu Glibc 2.17 All All All
Application Gnu Glibc 2.18 All All All
Application Gnu Glibc 2.19 All All All
Application Gnu Glibc 2.20 All All All
Application Gnu Glibc 2.21 All All All
Application Gnu Glibc 2.22 All All All
Application Gnu Glibc 2.9 All All All
Application Hp Helion Openstack 1.1.1 All All All
Application Hp Helion Openstack 2.0.0 All All All
Application Hp Helion Openstack 2.1.0 All All All
Application Hp Server Migration Pack 7.5 All All All
Operating System Opensuse Opensuse 13.2 All All All
Application Oracle Exalogic Infrastructure 1.0 All All All
Application Oracle Exalogic Infrastructure 2.0 All All All
Operating System Oracle Fujitsu M10 Firmware All All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Hpc Node 7.0 All All All
Operating System Redhat Enterprise Linux Hpc Node Eus 7.2 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Server Aus 7.2 All All All
Operating System Redhat Enterprise Linux Server Eus 7.2 All All All
Operating System Redhat Enterprise Linux Workstation 7.0 All All All
Application Sophos Unified Threat Management Software 9.319 All All All
Application Sophos Unified Threat Management Software 9.355 All All All
Application Suse Linux Enterprise Debuginfo 11.0 sp2 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp3 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp4 All All
Operating System Suse Linux Enterprise Desktop 11.0 sp3 All All
Operating System Suse Linux Enterprise Desktop 11.0 sp4 All All
Operating System Suse Linux Enterprise Desktop 12 All All All
Operating System Suse Linux Enterprise Desktop 12 sp1 All All
Operating System Suse Linux Enterprise Server 11.0 sp2 All All
Operating System Suse Linux Enterprise Server 11.0 sp3 All All
Operating System Suse Linux Enterprise Server 11.0 sp3 All All
Operating System Suse Linux Enterprise Server 11.0 sp4 All All
Operating System Suse Linux Enterprise Server 12 sp1 All All
Operating System Suse Linux Enterprise Software Development Kit 11.0 sp3 All All
Operating System Suse Linux Enterprise Software Development Kit 11.0 sp4 All All
Operating System Suse Linux Enterprise Software Development Kit 12 All All All
Operating System Suse Linux Enterprise Software Development Kit 12 sp1 All All
Operating System Suse Suse Linux Enterprise Server 12 All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Na N/a affected n/a Not specified

References

ReferenceSourceLinkTags
[security-announce] openSUSE-SU-2016:0510-1: important: Security update af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
Full Disclosure: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X af854a3a-2127-422b-91ae-364da2661108 seclists.org
UTM Up2Date 9.355 released | Sophos Blog af854a3a-2127-422b-91ae-364da2661108 blogs.sophos.com Third Party Advisory
glibc - 'getaddrinfo' Remote Stack Buffer Overflow af854a3a-2127-422b-91ae-364da2661108 www.exploit-db.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
StruxureWare Data Center Operation Software Vulnerability Fixes - User Assistance for StruxureWare Data Center Operation 8 - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz af854a3a-2127-422b-91ae-364da2661108 help.ecostruxureit.com
SOL47098834 - glibc vulnerability CVE-2015-7547 af854a3a-2127-422b-91ae-364da2661108 support.f5.com Third Party Advisory
Debian -- Security Information -- DSA-3481-1 glibc af854a3a-2127-422b-91ae-364da2661108 www.debian.org Third Party Advisory
Page Not Found - Lenovo Support US af854a3a-2127-422b-91ae-364da2661108 support.lenovo.com
Cisco Device Hardcoded Credentials / GNU glibc / BusyBox ≈ Packet Storm af854a3a-2127-422b-91ae-364da2661108 packetstormsecurity.com
'[security bulletin] HPSBGN03547 rev.1 - HPE Helion Eucalyptus Node Controller and other Helion Eucal' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info
Bug 1293532 – CVE-2015-7547 glibc: getaddrinfo stack-based buffer overflow af854a3a-2127-422b-91ae-364da2661108 bugzilla.redhat.com Issue Tracking, Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
Google Online Security Blog: CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow af854a3a-2127-422b-91ae-364da2661108 googleonlinesecurity.blogspot.com
USN-2900-1: GNU C Library vulnerability | Ubuntu af854a3a-2127-422b-91ae-364da2661108 ubuntu.com Third Party Advisory
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
Full Disclosure: SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series af854a3a-2127-422b-91ae-364da2661108 seclists.org
[security-announce] SUSE-SU-2016:0470-1: important: Security update for af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
GNU glibc 'getaddrinfo()' Function Multiple Stack Buffer Overflow Vulnerabilities af854a3a-2127-422b-91ae-364da2661108 www.securityfocus.com
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
FortiGuard af854a3a-2127-422b-91ae-364da2661108 www.fortiguard.com
'[security bulletin] HPSBGN03551 rev.1 - HPE Helion Development Platform using glibc, Remote Denial o' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info
Debian -- Security Information -- DSA-3480-1 eglibc af854a3a-2127-422b-91ae-364da2661108 www.debian.org
UTM Up2Date 9.319 released | Sophos Blog af854a3a-2127-422b-91ae-364da2661108 blogs.sophos.com Third Party Advisory
Critical security flaw: glibc stack-based buffer overflow in getaddrinfo() (CVE-2015-7547) - Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 access.redhat.com Third Party Advisory
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
Glibc getaddrinfo() Stack Overflow Lets Remote or Local Users Execute Arbitrary Code - SecurityTracker af854a3a-2127-422b-91ae-364da2661108 www.securitytracker.com
Nexans FTTO GigaSwitch Outdated Components / Hardcoded Backdoor ≈ Packet Storm af854a3a-2127-422b-91ae-364da2661108 packetstormsecurity.com
[security-announce] SUSE-SU-2016:0473-1: important: Security update for af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
Broadcom Support Portal af854a3a-2127-422b-91ae-364da2661108 bto.bluecoat.com Third Party Advisory
[security-announce] openSUSE-SU-2016:0512-1: critical: Security update f af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
[R1] Portable SDK for UPnP Devices (libupnp) glibc Implementation getaddrinfo() Function Remote Stack Overflow - Research Advisory | Tenable® af854a3a-2127-422b-91ae-364da2661108 www.tenable.com
'[security bulletin] HPSBGN03549 rev.1 - HP IceWall Products using glibc, Remote Denial of Service (D' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info
FortiGuard af854a3a-2127-422b-91ae-364da2661108 fortiguard.com
glibc getaddrinfo Stack-Based Buffer Overflow ≈ Packet Storm af854a3a-2127-422b-91ae-364da2661108 packetstormsecurity.com
[security-announce] SUSE-SU-2016:0472-1: important: Security update for af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
'[security bulletin] HPSBGN03582 rev.1 - HPE Helion CloudSystem using glibc, Remote Code Execution, D' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info
Arista - Security Advisory 0017 af854a3a-2127-422b-91ae-364da2661108 www.arista.com
Bugtraq: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X af854a3a-2127-422b-91ae-364da2661108 seclists.org
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
Full Disclosure: SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices af854a3a-2127-422b-91ae-364da2661108 seclists.org
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
Public KB - SA40161 - [Pulse Secure] glibc getaddrinfo stack-based buffer overflow (CVE-2015-7547) af854a3a-2127-422b-91ae-364da2661108 kb.pulsesecure.net Third Party Advisory
Oracle Critical Patch Update - January 2018 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
[security-announce] SUSE-SU-2016:0471-1: important: Security update for af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
Oracle Critical Patch Update Advisory - April 2016 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com Patch, Third Party Advisory
Oracle Linux Bulletin - January 2016 af854a3a-2127-422b-91ae-364da2661108 www.oracle.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
Citrix Security Advisory for glibc Vulnerability CVE-2015-7547 af854a3a-2127-422b-91ae-364da2661108 support.citrix.com
18665 – (CVE-2015-7547) In send_dg, the recvfrom function is NOT always using the buffer size of a newly created buffer (CVE-2015-7547) af854a3a-2127-422b-91ae-364da2661108 sourceware.org Issue Tracking
Siemens Industrial Products glibc Library Vulnerability (Update C) | ICS-CERT af854a3a-2127-422b-91ae-364da2661108 ics-cert.us-cert.gov
Carlos O'Donell - [PATCH] CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflo af854a3a-2127-422b-91ae-364da2661108 sourceware.org Mailing List, Vendor Advisory
VMSA-2016-0002 | United States af854a3a-2127-422b-91ae-364da2661108 www.vmware.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com Third Party Advisory
[SECURITY] Fedora 23 Update: glibc-2.22-9.fc23 af854a3a-2127-422b-91ae-364da2661108 lists.fedoraproject.org
Security Advisory - GNU Glibc Buffer Overflow Security Vulnerability af854a3a-2127-422b-91ae-364da2661108 www.huawei.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
GNU C Library: Multiple vulnerabilities (GLSA 201602-02) — Gentoo Security af854a3a-2127-422b-91ae-364da2661108 security.gentoo.org Third Party Advisory
Red Hat Customer Portal af854a3a-2127-422b-91ae-364da2661108 rhn.redhat.com
'[security bulletin] HPSBGN03442 rev.1 - HP Helion OpenStack using glibc, Remote Denial of Service (D' - MARC af854a3a-2127-422b-91ae-364da2661108 marc.info
Vulnerability Note VU#457759 - glibc vulnerable to stack buffer overflow in DNS resolver af854a3a-2127-422b-91ae-364da2661108 www.kb.cert.org
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
Document Display | HPE Support Center af854a3a-2127-422b-91ae-364da2661108 h20566.www2.hpe.com
[SECURITY] Fedora 22 Update: glibc-2.21-11.fc22 af854a3a-2127-422b-91ae-364da2661108 lists.fedoraproject.org
McAfee KnowledgeBase - Intel Security - Security Bulletin: glibc vulnerabilities CVE-2015-5229 and CVE-2015-7547 af854a3a-2127-422b-91ae-364da2661108 kc.mcafee.com Third Party Advisory
CVE-2015-7547 GNU C Library (glibc) Vulnerability in Multiple NetApp Products | NetApp Product Security af854a3a-2127-422b-91ae-364da2661108 security.netapp.com
Moxa Command Injection / Cross Site Scripting / Vulnerable Software ≈ Packet Storm af854a3a-2127-422b-91ae-364da2661108 packetstormsecurity.com
glibc - getaddrinfo Stack-Based Buffer Overflow af854a3a-2127-422b-91ae-364da2661108 www.exploit-db.com
[security-announce] openSUSE-SU-2016:0511-1: critical: Security update f af854a3a-2127-422b-91ae-364da2661108 lists.opensuse.org Third Party Advisory
Red Hat Customer Portal MITRE access.redhat.com
Red Hat Customer Portal MITRE access.redhat.com
Red Hat Customer Portal MITRE access.redhat.com
Red Hat Customer Portal MITRE access.redhat.com
CVE-2015-7547 - Red Hat Customer Portal MITRE access.redhat.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 43886 Huawei Router and Switch Buffer Overflow Vulnerability (Huawei-SA-20160304-01-glibc-en)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report