CVE-2013-7423
Description
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
glibc's getaddrinfo() DNS resolution can send queries to unintended file descriptors under high load, causing information disclosure or data corruption.
Vulnerability
The send_dg function in resolv/res_send.c of GNU C Library (glibc) before version 2.20 does not properly reuse file descriptors when processing DNS queries [1][2]. Under a large number of requests that trigger getaddrinfo(), file descriptors may be closed or reassigned, causing subsequent DNS queries to be sent to unintended network sockets. This affects all glibc versions prior to 2.20, including those shipped in Red Hat Enterprise Linux 6 and Ubuntu 10.04 LTS, 12.04 LTS, and 14.04 LTS [1][4].
Exploitation
An attacker can exploit this flaw by sending a high volume of DNS requests to an application using glibc's getaddrinfo() function. The application invokes send_dg to send DNS queries; under load, send_dg may reuse a file descriptor that has already been closed or reassigned, sending the DNS query to an unintended recipient [1][4]. No special authentication or network position is required beyond the ability to trigger DNS resolution through the affected application [1].
Impact
Successful exploitation may cause the application to send DNS queries to unintended locations, potentially leaking sensitive information or corrupting data received from the DNS response [1][4]. This can lead to denial of service in other applications or information disclosure [4]. The attacker does not gain code execution or elevated privileges directly; the impact is limited to the confidentiality and integrity of DNS-related data.
Mitigation
A patched glibc version (2.20 or later) is available. Red Hat released updates via RHSA-2015:0863 and RHSA-2016:1207 for Red Hat Enterprise Linux 6 and 7 respectively [1][2]. Ubuntu published USN-2519-1 fixing the issue for supported releases [4]. Users should update glibc to the fixed version provided by their distribution. No workarounds are documented in the available references.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
14cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- osv-coords5 versionspkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweedpkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 2.24-2.3+ 4 more
- (no CPE)range: < 2.24-2.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
- (no CPE)range: < 2.19-20.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- lists.opensuse.org/opensuse-updates/2015-02/msg00089.htmlnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/01/28/20nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/72844nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2519-1nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2016:1207nvdThird Party Advisory
- github.com/golang/go/issues/6336nvdThird Party Advisory
- security.gentoo.org/glsa/201602-02nvdThird Party Advisory
- sourceware.org/bugzilla/show_bug.cginvdIssue Tracking
- packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-0863.htmlnvd
- seclists.org/fulldisclosure/2021/Sep/0nvd
News mentions
0No linked articles in our index yet.