RULE(RULE ID:105207)

Rule General Information
Release Date: 2016-09-08
Rule Name: GNU C Library Getaddrinfo Buffer Overflow Vulnerability -2 (CVE-2015-7547)
Severity:
CVE ID:
Rule Protection Details
Description: Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service.
Affected OS: Other Unix, Linux
Reference: SecurityFocusBID:83265
SecurityTrackerID:1035020
ExploitDB:39454
Solutions
More advisories have been published on the website, please visit for more suggestions:
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html