TROYANOSYVIRUS
Retour aux CVEs

CVE-2015-7547

N/A

Description

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Details CVE

Score CVSS v3.1N/A
Publie2/18/2016
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0

Produits affectes

canonical:ubuntu_linuxdebian:debian_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managergnu:glibchp:helion_openstackhp:server_migration_packopensuse:opensuseoracle:exalogic_infrastructureoracle:fujitsu_m10_firmwareredhat:enterprise_linux_desktopredhat:enterprise_linux_hpc_noderedhat:enterprise_linux_hpc_node_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_eusredhat:enterprise_linux_workstationsophos:unified_threat_management_softwaresuse:linux_enterprise_debuginfosuse:linux_enterprise_desktopsuse:linux_enterprise_serversuse:linux_enterprise_software_development_kitsuse:suse_linux_enterprise_server

Faiblesses (CWE)

CWE-119

References

http://marc.info/?l=bugtraq&m=145596041017029&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=145672440608228&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=145690841819314&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=145857691004892&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=146161017210491&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0175.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0176.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0225.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2016-0277.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2019/Sep/7(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2021/Sep/0(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2022/Jun/36(af854a3a-2127-422b-91ae-364da2661108)
http://support.citrix.com/article/CTX206991(af854a3a-2127-422b-91ae-364da2661108)
http://ubuntu.com/usn/usn-2900-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3480(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3481(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/83265(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035020(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/articles/2161461(af854a3a-2127-422b-91ae-364da2661108)
https://bto.bluecoat.com/security-advisory/sa114(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1293532(af854a3a-2127-422b-91ae-364da2661108)
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Sep/7(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/201602-02(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20160217-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://sourceware.org/bugzilla/show_bug.cgi?id=18665(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39454/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40339/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/457759(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/research/tra-2017-08(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.