Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-7547

Опубликовано: 18 фев. 2016
Источник: ubuntu
Приоритет: high
EPSS Критический
CVSS2: 6.8
CVSS3: 8.1

Описание

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

2.19-0ubuntu6.7
precise

released

2.15-0ubuntu10.13
trusty

released

2.19-0ubuntu6.7
trusty/esm

released

2.19-0ubuntu6.7
upstream

needs-triage

vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.21-0ubuntu6
esm-infra-legacy/trusty

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

ignored

end of life
vivid/stable-phone-overlay

released

2.21-0ubuntu4.0.1
vivid/ubuntu-core

released

2.21-0ubuntu4.0.1
wily

released

2.21-0ubuntu4.1

Показывать по

EPSS

Процентиль: 100%
0.93421
Критический

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
nvd
больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVSS3: 8.1
debian
больше 9 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...

suse-cvrf
больше 9 лет назад

Recommended update for certification-sles-eal4

CVSS3: 8.1
github
больше 3 лет назад

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

EPSS

Процентиль: 100%
0.93421
Критический

6.8 Medium

CVSS2

8.1 High

CVSS3