CVE-2015-7547

Summary

CVECVE-2015-7547
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2016-02-18 21:59:00 UTC
Updated2023-02-12 23:15:00 UTC
DescriptionMultiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Risk And Classification

Problem Types: CWE-119

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Canonical Ubuntu Linux 12.04 All All All
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 15.10 All All All
Operating System Canonical Ubuntu Linux 12.04 All All All
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 15.10 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Debian Debian Linux 8.0 All All All
Application F5 Big-ip Access Policy Manager 12.0.0 All All All
Application F5 Big-ip Access Policy Manager 12.0.0 All All All
Application F5 Big-ip Advanced Firewall Manager 12.0.0 All All All
Application F5 Big-ip Advanced Firewall Manager 12.0.0 All All All
Application F5 Big-ip Analytics 12.0.0 All All All
Application F5 Big-ip Analytics 12.0.0 All All All
Application F5 Big-ip Application Acceleration Manager 12.0.0 All All All
Application F5 Big-ip Application Acceleration Manager 12.0.0 All All All
Application F5 Big-ip Application Security Manager 12.0.0 All All All
Application F5 Big-ip Application Security Manager 12.0.0 All All All
Application F5 Big-ip Domain Name System 12.0.0 All All All
Application F5 Big-ip Domain Name System 12.0.0 All All All
Application F5 Big-ip Link Controller 12.0.0 All All All
Application F5 Big-ip Link Controller 12.0.0 All All All
Application F5 Big-ip Local Traffic Manager 12.0.0 All All All
Application F5 Big-ip Local Traffic Manager 12.0.0 All All All
Application F5 Big-ip Policy Enforcement Manager 12.0.0 All All All
Application F5 Big-ip Policy Enforcement Manager 12.0.0 All All All
Application Gnu Glibc 2.10 All All All
Application Gnu Glibc 2.10.1 All All All
Application Gnu Glibc 2.11 All All All
Application Gnu Glibc 2.11.1 All All All
Application Gnu Glibc 2.11.2 All All All
Application Gnu Glibc 2.11.3 All All All
Application Gnu Glibc 2.12 All All All
Application Gnu Glibc 2.12.1 All All All
Application Gnu Glibc 2.12.2 All All All
Application Gnu Glibc 2.13 All All All
Application Gnu Glibc 2.14 All All All
Application Gnu Glibc 2.14.1 All All All
Application Gnu Glibc 2.15 All All All
Application Gnu Glibc 2.16 All All All
Application Gnu Glibc 2.17 All All All
Application Gnu Glibc 2.18 All All All
Application Gnu Glibc 2.19 All All All
Application Gnu Glibc 2.20 All All All
Application Gnu Glibc 2.21 All All All
Application Gnu Glibc 2.22 All All All
Application Gnu Glibc 2.9 All All All
Application Gnu Glibc 2.10 All All All
Application Gnu Glibc 2.10.1 All All All
Application Gnu Glibc 2.11 All All All
Application Gnu Glibc 2.11.1 All All All
Application Gnu Glibc 2.11.2 All All All
Application Gnu Glibc 2.11.3 All All All
Application Gnu Glibc 2.12 All All All
Application Gnu Glibc 2.12.1 All All All
Application Gnu Glibc 2.12.2 All All All
Application Gnu Glibc 2.13 All All All
Application Gnu Glibc 2.14 All All All
Application Gnu Glibc 2.14.1 All All All
Application Gnu Glibc 2.15 All All All
Application Gnu Glibc 2.16 All All All
Application Gnu Glibc 2.17 All All All
Application Gnu Glibc 2.18 All All All
Application Gnu Glibc 2.19 All All All
Application Gnu Glibc 2.20 All All All
Application Gnu Glibc 2.21 All All All
Application Gnu Glibc 2.22 All All All
Application Gnu Glibc 2.9 All All All
Application Hp Helion Openstack 1.1.1 All All All
Application Hp Helion Openstack 2.0.0 All All All
Application Hp Helion Openstack 2.1.0 All All All
Application Hp Helion Openstack 1.1.1 All All All
Application Hp Helion Openstack 2.0.0 All All All
Application Hp Helion Openstack 2.1.0 All All All
Application Hp Server Migration Pack 7.5 All All All
Application Hp Server Migration Pack 7.5 All All All
Operating System Opensuse Opensuse 13.2 All All All
Operating System Opensuse Opensuse 13.2 All All All
Application Oracle Exalogic Infrastructure 1.0 All All All
Application Oracle Exalogic Infrastructure 2.0 All All All
Application Oracle Exalogic Infrastructure 1.0 All All All
Application Oracle Exalogic Infrastructure 2.0 All All All
Operating System Oracle Fujitsu M10 Firmware All All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Desktop 7.0 All All All
Operating System Redhat Enterprise Linux Hpc Node 7.0 All All All
Operating System Redhat Enterprise Linux Hpc Node 7.0 All All All
Operating System Redhat Enterprise Linux Hpc Node Eus 7.2 All All All
Operating System Redhat Enterprise Linux Hpc Node Eus 7.2 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Server 7.0 All All All
Operating System Redhat Enterprise Linux Server Aus 7.2 All All All
Operating System Redhat Enterprise Linux Server Aus 7.2 All All All
Operating System Redhat Enterprise Linux Server Eus 7.2 All All All
Operating System Redhat Enterprise Linux Server Eus 7.2 All All All
Operating System Redhat Enterprise Linux Workstation 7.0 All All All
Operating System Redhat Enterprise Linux Workstation 7.0 All All All
Application Sophos Unified Threat Management Software 9.319 All All All
Application Sophos Unified Threat Management Software 9.355 All All All
Application Sophos Unified Threat Management Software 9.319 All All All
Application Sophos Unified Threat Management Software 9.355 All All All
Application Suse Linux Enterprise Debuginfo 11.0 sp2 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp3 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp4 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp2 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp3 All All
Application Suse Linux Enterprise Debuginfo 11.0 sp4 All All
Operating System Suse Linux Enterprise Desktop 11.0 sp3 All All
Operating System Suse Linux Enterprise Desktop 11.0 sp4 All All
Operating System Suse Linux Enterprise Desktop 12 All All All
Operating System Suse Linux Enterprise Desktop 12 sp1 All All
Operating System Suse Linux Enterprise Desktop 11.0 sp3 All All
Operating System Suse Linux Enterprise Desktop 11.0 sp4 All All
Operating System Suse Linux Enterprise Desktop 12 All All All
Operating System Suse Linux Enterprise Desktop 12 sp1 All All
Operating System Suse Linux Enterprise Server 11.0 sp2 All All
Operating System Suse Linux Enterprise Server 11.0 sp3 All All
Operating System Suse Linux Enterprise Server 11.0 sp3 All All
Operating System Suse Linux Enterprise Server 11.0 sp4 All All
Operating System Suse Linux Enterprise Server 12 sp1 All All
Operating System Suse Linux Enterprise Server 11.0 sp2 All All
Operating System Suse Linux Enterprise Server 11.0 sp3 All All
Operating System Suse Linux Enterprise Server 11.0 sp3 All All
Operating System Suse Linux Enterprise Server 11.0 sp4 All All
Operating System Suse Linux Enterprise Server 12 sp1 All All
Operating System Suse Linux Enterprise Software Development Kit 11.0 sp3 All All
Operating System Suse Linux Enterprise Software Development Kit 11.0 sp4 All All
Operating System Suse Linux Enterprise Software Development Kit 12 All All All
Operating System Suse Linux Enterprise Software Development Kit 12 sp1 All All
Operating System Suse Linux Enterprise Software Development Kit 11.0 sp3 All All
Operating System Suse Linux Enterprise Software Development Kit 11.0 sp4 All All
Operating System Suse Linux Enterprise Software Development Kit 12 All All All
Operating System Suse Linux Enterprise Software Development Kit 12 sp1 All All
Operating System Suse Suse Linux Enterprise Server 12 All All All
Operating System Suse Suse Linux Enterprise Server 12 All All All

References

ReferenceSourceLinkTags
Oracle Critical Patch Update Advisory - April 2016 CONFIRM www.oracle.com Patch, Third Party Advisory
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
Vulnerability Note VU#457759 - glibc vulnerable to stack buffer overflow in DNS resolver CERT-VN www.kb.cert.org
'[security bulletin] HPSBGN03549 rev.1 - HP IceWall Products using glibc, Remote Denial of Service (D' - MARC HP marc.info
[security-announce] openSUSE-SU-2016:0512-1: critical: Security update f SUSE lists.opensuse.org Third Party Advisory
[security-announce] SUSE-SU-2016:0470-1: important: Security update for SUSE lists.opensuse.org Third Party Advisory
CVE-2015-7547 - Red Hat Customer Portal MISC access.redhat.com
Bug 1293532 – CVE-2015-7547 glibc: getaddrinfo stack-based buffer overflow CONFIRM bugzilla.redhat.com Issue Tracking, Third Party Advisory
Red Hat Customer Portal MISC access.redhat.com
UTM Up2Date 9.355 released | Sophos Blog CONFIRM blogs.sophos.com Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com Third Party Advisory
GNU glibc 'getaddrinfo()' Function Multiple Stack Buffer Overflow Vulnerabilities BID www.securityfocus.com
Citrix Security Advisory for glibc Vulnerability CVE-2015-7547 CONFIRM support.citrix.com
[SECURITY] Fedora 22 Update: glibc-2.21-11.fc22 FEDORA lists.fedoraproject.org
glibc getaddrinfo Stack-Based Buffer Overflow ≈ Packet Storm MISC packetstormsecurity.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
UTM Up2Date 9.319 released | Sophos Blog CONFIRM blogs.sophos.com Third Party Advisory
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
Red Hat Customer Portal MISC access.redhat.com
[R1] Portable SDK for UPnP Devices (libupnp) glibc Implementation getaddrinfo() Function Remote Stack Overflow - Research Advisory | Tenable® MISC www.tenable.com
McAfee KnowledgeBase - Intel Security - Security Bulletin: glibc vulnerabilities CVE-2015-5229 and CVE-2015-7547 CONFIRM kc.mcafee.com Third Party Advisory
[SECURITY] Fedora 23 Update: glibc-2.22-9.fc23 FEDORA lists.fedoraproject.org
Moxa Command Injection / Cross Site Scripting / Vulnerable Software ≈ Packet Storm MISC packetstormsecurity.com
Siemens Industrial Products glibc Library Vulnerability (Update C) | ICS-CERT MISC ics-cert.us-cert.gov
Oracle Critical Patch Update - January 2018 CONFIRM www.oracle.com
Page Not Found - Lenovo Support US CONFIRM support.lenovo.com
Full Disclosure: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X FULLDISC seclists.org
Red Hat Customer Portal MISC access.redhat.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
Red Hat Customer Portal MISC access.redhat.com
Cisco Device Hardcoded Credentials / GNU glibc / BusyBox ≈ Packet Storm MISC packetstormsecurity.com
USN-2900-1: GNU C Library vulnerability | Ubuntu UBUNTU ubuntu.com Third Party Advisory
[security-announce] SUSE-SU-2016:0472-1: important: Security update for SUSE lists.opensuse.org Third Party Advisory
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
18665 – (CVE-2015-7547) In send_dg, the recvfrom function is NOT always using the buffer size of a newly created buffer (CVE-2015-7547) CONFIRM sourceware.org Issue Tracking
Carlos O'Donell - [PATCH] CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflo MLIST sourceware.org Mailing List, Vendor Advisory
Bugtraq: SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X BUGTRAQ seclists.org
Security Advisory - GNU Glibc Buffer Overflow Security Vulnerability CONFIRM www.huawei.com
[security-announce] openSUSE-SU-2016:0511-1: critical: Security update f SUSE lists.opensuse.org Third Party Advisory
Glibc getaddrinfo() Stack Overflow Lets Remote or Local Users Execute Arbitrary Code - SecurityTracker SECTRACK www.securitytracker.com
Debian -- Security Information -- DSA-3481-1 glibc DEBIAN www.debian.org Third Party Advisory
'[security bulletin] HPSBGN03547 rev.1 - HPE Helion Eucalyptus Node Controller and other Helion Eucal' - MARC HP marc.info
GNU C Library: Multiple vulnerabilities (GLSA 201602-02) — Gentoo Security GENTOO security.gentoo.org Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com
Broadcom Support Portal CONFIRM bto.bluecoat.com Third Party Advisory
Google Online Security Blog: CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow MISC googleonlinesecurity.blogspot.com
[security-announce] SUSE-SU-2016:0473-1: important: Security update for SUSE lists.opensuse.org Third Party Advisory
Nexans FTTO GigaSwitch Outdated Components / Hardcoded Backdoor ≈ Packet Storm MISC packetstormsecurity.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
SOL47098834 - glibc vulnerability CVE-2015-7547 CONFIRM support.f5.com Third Party Advisory
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
Public KB - SA40161 - [Pulse Secure] glibc getaddrinfo stack-based buffer overflow (CVE-2015-7547) CONFIRM kb.pulsesecure.net Third Party Advisory
[security-announce] openSUSE-SU-2016:0510-1: important: Security update SUSE lists.opensuse.org Third Party Advisory
'[security bulletin] HPSBGN03442 rev.1 - HP Helion OpenStack using glibc, Remote Denial of Service (D' - MARC HP marc.info
StruxureWare Data Center Operation Software Vulnerability Fixes - User Assistance for StruxureWare Data Center Operation 8 - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz CONFIRM help.ecostruxureit.com
FortiGuard CONFIRM www.fortiguard.com
CVE-2015-7547 GNU C Library (glibc) Vulnerability in Multiple NetApp Products | NetApp Product Security CONFIRM security.netapp.com
'[security bulletin] HPSBGN03582 rev.1 - HPE Helion CloudSystem using glibc, Remote Code Execution, D' - MARC HP marc.info
Critical security flaw: glibc stack-based buffer overflow in getaddrinfo() (CVE-2015-7547) - Red Hat Customer Portal CONFIRM access.redhat.com Third Party Advisory
Arista - Security Advisory 0017 MISC www.arista.com
Oracle Linux Bulletin - January 2016 CONFIRM www.oracle.com
Full Disclosure: SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices FULLDISC seclists.org
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
glibc - 'getaddrinfo' Remote Stack Buffer Overflow EXPLOIT-DB www.exploit-db.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
FortiGuard CONFIRM fortiguard.com
'[security bulletin] HPSBGN03551 rev.1 - HPE Helion Development Platform using glibc, Remote Denial o' - MARC HP marc.info
VMSA-2016-0002 | United States CONFIRM www.vmware.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
glibc - getaddrinfo Stack-Based Buffer Overflow EXPLOIT-DB www.exploit-db.com
[security-announce] SUSE-SU-2016:0471-1: important: Security update for SUSE lists.opensuse.org Third Party Advisory
Red Hat Customer Portal REDHAT rhn.redhat.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com
Document Display | HPE Support Center CONFIRM h20566.www2.hpe.com Third Party Advisory
Debian -- Security Information -- DSA-3480-1 eglibc DEBIAN www.debian.org
Red Hat Customer Portal REDHAT rhn.redhat.com
Full Disclosure: SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series FULLDISC seclists.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 43886 Huawei Router and Switch Buffer Overflow Vulnerability (Huawei-SA-20160304-01-glibc-en)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report