vulnerability
CentOS: (CVE-2015-7547) (Multiple Advisories): glibc
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Feb 17, 2016 | Jul 6, 2016 | May 7, 2019 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Feb 17, 2016
Added
Jul 6, 2016
Modified
May 7, 2019
Description
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Solution(s)
centos-upgrade-glibccentos-upgrade-glibc-commoncentos-upgrade-glibc-develcentos-upgrade-glibc-headerscentos-upgrade-glibc-staticcentos-upgrade-glibc-utilscentos-upgrade-nscd
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.