Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Information
Published : 2016-02-18 13:59
Updated : 2023-02-12 15:15
NVD link : CVE-2015-7547
Mitre link : CVE-2015-7547
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
suse
- linux_enterprise_desktop
- linux_enterprise_software_development_kit
- linux_enterprise_server
- suse_linux_enterprise_server
- linux_enterprise_debuginfo
gnu
- glibc
canonical
- ubuntu_linux
f5
- big-ip_application_security_manager
- big-ip_link_controller
- big-ip_policy_enforcement_manager
- big-ip_domain_name_system
- big-ip_advanced_firewall_manager
- big-ip_access_policy_manager
- big-ip_local_traffic_manager
- big-ip_application_acceleration_manager
- big-ip_analytics
oracle
- fujitsu_m10_firmware
- exalogic_infrastructure
redhat
- enterprise_linux_hpc_node_eus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_server
debian
- debian_linux
opensuse
- opensuse
hp
- helion_openstack
- server_migration_pack
sophos
- unified_threat_management_software