CVE-2015-7547

Scores

EPSS

0.940high94.0%
0%20%40%60%80%100%

Percentile: 94.0%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
6.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing “dual A/AAAA DNS queries” and the libnss_dns.so.2 NSS module.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-119CWE-121

Related Vulnerabilities

Exploits

Exploit ID: 39454

Source: exploitdb

URL: https://www.exploit-db.com/exploits/39454

Exploit ID: 40339

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40339

Recommendations

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2016-0176.html

Vulnerable Software (45)

Type: Configuration

Product: eglibc

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: eglibc

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "2.19-0ubuntu6.7"}

Source: ubuntu

Type: Configuration

Product: glibc

Operating System: debian

Trait:
{  "fixed": "2.21-8"}

Source: debian

Type: Configuration

Product: glibc

Operating System: rhel 6

Trait:
{  "fixed": "2.12-1.166.el6_7.7"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: rhel 6.2

Trait:
{  "fixed": "2.12-1.47.el6_2.17"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: rhel 6.4

Trait:
{  "fixed": "2.12-1.107.el6_4.9"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: rhel 6.5

Trait:
{  "fixed": "2.12-1.132.el6_5.7"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: rhel 6.6

Trait:
{  "fixed": "2.12-1.149.el6_6.11"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: rhel 7

Trait:
{  "fixed": "2.17-106.el7_2.4"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: rhel 7.1

Trait:
{  "fixed": "2.17-79.el7_1.4"}

Source: redhat

Type: Configuration

Product: glibc

Operating System: ubuntu vivid 15.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: glibc

Operating System: ubuntu wily 15.10

Trait:
{  "fixed": "2.21-0ubuntu4.1"}

Source: ubuntu

Type: Configuration

Product: rhev-hypervisor6

Operating System: rhel 6

Trait:
{  "fixed": "6.7-20160104.2.el6ev"}

Source: redhat

Type: Configuration

Product: rhev-hypervisor7

Operating System: rhel 6

Trait:
{  "fixed": "7.2-20160105.2.el6ev"}

Source: redhat

Type: Configuration

Product: rhev-hypervisor7

Operating System: rhel 7

Trait:
{  "fixed": "7.2-20160105.2.el7ev"}

Source: redhat

Type: Configuration

Vendor: *

Product: big-ip_access_policy_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firew...

Source: nvd

Type: Configuration

Vendor: *

Product: big-ip_advanced_firewall_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firew...

Source: nvd

Type: Configuration

Vendor: *

Product: big-ip_analytics

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firew...

Source: nvd

Type: Configuration

Vendor: *

Product: big-ip_application_acceleration_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firew...

Source: nvd

Type: Configuration

Vendor: *

Product: big-ip_application_security_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firew...

Source: nvd