|
|||
Rule General Information |
---|
Release Date: | 2016-09-08 | |
Rule Name: | GNU C Library Getaddrinfo Buffer Overflow Vulnerability -2 (CVE-2015-7547) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service. | |
Affected OS: | Other Unix, Linux | |
Reference: | SecurityFocusBID:83265 SecurityTrackerID:1035020 ExploitDB:39454 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html |