vendor:
glibc
by:
SpeeDr00t@Blackfalcon (jang kyoung chip)
8,1
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: glibc
Affected Version From: glibc prior to 2.18
Affected Version To: glibc 2.18
Patch Exists: YES
Related CWE: CVE-2015-7547
CPE: a:gnu:glibc:2.17
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/pulse-secure-pulse-connect-secure-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-2dd7e97e-d5e8-11e5-bcbd-bc5ff45d0f28/, https://www.rapid7.com/db/vulnerabilities/vmsa-2016-0002-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/cisco-xe-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/cisco-nx-os-cisco-sa-20160218-glibc/, https://www.rapid7.com/db/vulnerabilities/panos-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2016-653/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2016-0176/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2015-7547/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2016-0175/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2016-0225/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2016
CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow
CVE-2015-7547 is a stack-based buffer overflow vulnerability in the glibc getaddrinfo() function. It was discovered by Google and affects all versions of glibc prior to 2.18. The vulnerability is triggered when a maliciously crafted DNS response is received by an application that uses the getaddrinfo() function. The vulnerability can be exploited to execute arbitrary code on the vulnerable system.
Mitigation:
The vulnerability can be mitigated by upgrading to glibc version 2.18 or later.