Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-7547

Опубликовано: 16 фев. 2016
Источник: redhat
CVSS2: 6.8

Описание

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.

Отчет

After updating the glibc package on affected systems, it is strongly recommended to reboot the system or restart all the affected services. For more information please refer to: https://access.redhat.com/articles/2161461

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3glibcNot affected
Red Hat Enterprise Linux 4glibcNot affected
Red Hat Enterprise Linux 5glibcNot affected
Red Hat Enterprise Linux Extended Update Support 6.7guest-imagesAffected
Red Hat Enterprise Linux Extended Update Support 7.2rhel-guest-imageAffected
Red Hat Enterprise Linux 6glibcFixedRHSA-2016:017516.02.2016
Red Hat Enterprise Linux 6.2 Advanced Update SupportglibcFixedRHSA-2016:022516.02.2016
Red Hat Enterprise Linux 6.4 Advanced Update SupportglibcFixedRHSA-2016:022516.02.2016
Red Hat Enterprise Linux 6.5 Advanced Update SupportglibcFixedRHSA-2016:022516.02.2016
Red Hat Enterprise Linux 6.6 Extended Update SupportglibcFixedRHSA-2016:022516.02.2016

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1293532glibc: getaddrinfo stack-based buffer overflow

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
nvd
больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
debian
больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...

suse-cvrf
больше 9 лет назад

Recommended update for certification-sles-eal4

CVSS3: 8.1
github
больше 3 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

6.8 Medium

CVSS2