Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2015-7547
Severity
8.1HIGH
EPSS
94.0%
top 0.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedFeb 18
Latest updateMay 13
Description
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages26 packages
Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 15.10, Enterprise Linux 7.2
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-5xr7-h7cp-w9pc: Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6)↗2022-05-13
OSV▶
CVE-2015-7547: Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6)↗2016-02-18
CVEList▶
CVE-2015-7547: Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6)↗2016-02-18
VulnCheck
▶
💥Exploits & PoCs
2🔍Detection Rules
7Suricata
▶
📋Vendor Advisories
4Debian▶
CVE-2015-7547: glibc - Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functio...↗2015