CVE-2015-7547
18.02.2016, 21:59
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.Enginsight
Vendor | Product | Version |
---|---|---|
debian | debian_linux | 8.0 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.10 |
hp | helion_openstack | 1.1.1 |
hp | helion_openstack | 2.0.0 |
hp | helion_openstack | 2.1.0 |
hp | server_migration_pack | 7.5 |
sophos | unified_threat_management_software | 9.319 |
sophos | unified_threat_management_software | 9.355 |
suse | linux_enterprise_debuginfo | 11.0:sp2 |
suse | linux_enterprise_debuginfo | 11.0:sp3 |
suse | linux_enterprise_debuginfo | 11.0:sp4 |
opensuse | opensuse | 13.2 |
suse | linux_enterprise_desktop | 11.0:sp3 |
suse | linux_enterprise_desktop | 11.0:sp4 |
suse | linux_enterprise_server | 11.0:sp2 |
suse | linux_enterprise_server | 11.0:sp3 |
suse | linux_enterprise_server | 11.0:sp3 |
suse | linux_enterprise_server | 11.0:sp4 |
suse | linux_enterprise_software_development_kit | 11.0:sp3 |
suse | linux_enterprise_software_development_kit | 11.0:sp4 |
oracle | exalogic_infrastructure | 1.0 |
oracle | exalogic_infrastructure | 2.0 |
f5 | big-ip_access_policy_manager | 12.0.0 |
f5 | big-ip_advanced_firewall_manager | 12.0.0 |
f5 | big-ip_analytics | 12.0.0 |
f5 | big-ip_application_acceleration_manager | 12.0.0 |
f5 | big-ip_application_security_manager | 12.0.0 |
f5 | big-ip_domain_name_system | 12.0.0 |
f5 | big-ip_link_controller | 12.0.0 |
f5 | big-ip_local_traffic_manager | 12.0.0 |
f5 | big-ip_policy_enforcement_manager | 12.0.0 |
oracle | fujitsu_m10_firmware | 𝑥 ≤ 2290 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_hpc_node | 7.0 |
redhat | enterprise_linux_hpc_node_eus | 7.2 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.2 |
redhat | enterprise_linux_server_eus | 7.2 |
redhat | enterprise_linux_workstation | 7.0 |
gnu | glibc | 2.9 |
gnu | glibc | 2.10 |
gnu | glibc | 2.10.1 |
gnu | glibc | 2.11 |
gnu | glibc | 2.11.1 |
gnu | glibc | 2.11.2 |
gnu | glibc | 2.11.3 |
gnu | glibc | 2.12 |
gnu | glibc | 2.12.1 |
gnu | glibc | 2.12.2 |
gnu | glibc | 2.13 |
gnu | glibc | 2.14 |
gnu | glibc | 2.14.1 |
gnu | glibc | 2.15 |
gnu | glibc | 2.16 |
gnu | glibc | 2.17 |
gnu | glibc | 2.18 |
gnu | glibc | 2.19 |
gnu | glibc | 2.20 |
gnu | glibc | 2.21 |
gnu | glibc | 2.22 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References