VYPR
High severity8.1NVD Advisory· Published Feb 18, 2016· Updated May 6, 2026

CVE-2015-7547

CVE-2015-7547

Description

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Affected products

59
  • GNU/Glibc21 versions
    cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*+ 20 more
    • cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
    • cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
    • cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
  • cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 2 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
  • cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*
    Range: <=2290
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*+ 5 more
    • cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
    • cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
  • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

73

News mentions

0

No linked articles in our index yet.