Palo Alto Networks PAN-SA-2016-0021 (CVE-2015-7547): Glibc DNS Resolver Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | February 18, 2016 | October 12, 2016 | December 22, 2017 |
Description
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Scan For This Vulnerability
Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities
References
- BID-83265
- DEBIAN-DLA-416-1
- DEBIAN-DSA-3480
- DEBIAN-DSA-3481
- GENTOO-GLSA-201602-02
- NVD-CVE-2015-7547
- REDHAT-RHSA-2016:0175
- REDHAT-RHSA-2016:0176
- REDHAT-RHSA-2016:0225
- REDHAT-RHSA-2016:0277
- SECTRACK-1035020
- SUSE-SUSE-SU-2016:0470
- SUSE-SUSE-SU-2016:0471
- SUSE-SUSE-SU-2016:0472
- SUSE-SUSE-SU-2016:0473
- UBUNTU-USN-2900-1
- URL: https://securityadvisories.paloaltonetworks.com
Solution
palo-alto-networks-pan-os-upgrade-5-0Related Vulnerabilities
- F5 Networks: K47098834 (CVE-2015-7547): glibc vulnerability CVE-2015-7547
- Gentoo Linux: CVE-2015-7547: GNU C Library: Multiple vulnerabilities
- VMSA-2016-0002: Stack buffer overflow in the glibc getaddrinfo function (CVE-2015-7547)
- Ubuntu: USN-2900-1 (CVE-2015-7547): GNU C Library vulnerability
- Oracle Linux: (CVE-2015-7547) (Multiple Advisories): glibc security, bug fix, and enhancement update
- CentOS: (CVE-2015-7547) (Multiple Advisories): glibc
- Cisco NX-OS: Vulnerability in GNU glibc Affecting Cisco Products: February 2016 (CVE-2015-7547)
- Debian: CVE-2015-7547: glibc -- security update
- SUSE: CVE-2015-7547: SUSE Linux Security Advisory