8.1
CWE
119
Advisory Published
CVE Published
Updated

CVE-2015-7547: Buffer Overflow

First published: Tue Dec 22 2015(Updated: )

A stack-based buffer overflow was found in libresolv when invoked from nss_dns, allowing specially crafted DNS responses to seize control of EIP in the DNS client. The buffer overflow occurs in the functions send_dg (send datagram) and send_vc (send TCP) for the NSS module libnss_dns.so.2 when calling getaddrinfo with AF_UNSPEC family, or in some cases AF_INET6 family. The use of AF_UNSPEC (or AF_INET6 in some cases) triggers the low-level resolver code to send out two parallel queries for A and AAAA. A mismanagement of the buffers used for those queries could result in the response of a query writing beyond the alloca allocated buffer created by __res_nquery.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Debian Linux=8.0
Ubuntu=12.04
Ubuntu=14.04
Ubuntu=15.10
HP Helion OpenStack=1.1.1
HP Helion OpenStack=2.0.0
HP Helion OpenStack=2.1.0
HP Server Migration Package=7.5
Sophos Unified Threat Management=9.319
Sophos Unified Threat Management=9.355
SUSE Linux Enterprise Debuginfo=11.0-sp2
SUSE Linux Enterprise Debuginfo=11.0-sp3
SUSE Linux Enterprise Debuginfo=11.0-sp4
openSUSE=13.2
SUSE Linux Enterprise Desktop=11.0-sp3
SUSE Linux Enterprise Desktop=11.0-sp4
SUSE Linux Enterprise Desktop=12
SUSE Linux Enterprise Desktop=12-sp1
SUSE Linux Enterprise Server=11.0-sp2
SUSE Linux Enterprise Server=11.0-sp3
SUSE Linux Enterprise Server=11.0-sp3
SUSE Linux Enterprise Server=11.0-sp4
SUSE Linux Enterprise Server=12-sp1
SUSE Linux Enterprise Software Development Kit=11.0-sp3
SUSE Linux Enterprise Software Development Kit=11.0-sp4
SUSE Linux Enterprise Software Development Kit=12
SUSE Linux Enterprise Software Development Kit=12-sp1
SUSE Linux Enterprise Server=12
Oracle Exalogic Infrastructure=1.0
Oracle Exalogic Infrastructure=2.0
F5 Access Policy Manager=12.0.0
F5 BIG-IP Advanced Firewall Manager=12.0.0
F5 BIG-IP Analytics=12.0.0
F5 BIG-IP Application Acceleration Manager=12.0.0
F5 Application Security Manager=12.0.0
F5 BIG-IP=12.0.0
F5 BIG-IP Link Controller=12.0.0
Riverbed SteelApp Traffic Manager=12.0.0
F5 BIG-IP Policy Enforcement Manager=12.0.0
Oracle Fujitsu M10-4S Firmware<=2290
Red Hat Enterprise Linux Desktop=7.0
Red Hat Enterprise Linux HPC Node=7.0
Red Hat Enterprise Linux HPC Node=7.2
Red Hat Enterprise Linux Server=7.0
Red Hat Enterprise Linux Server=7.2
Red Hat Enterprise Linux Server=7.2
Red Hat Enterprise Linux Workstation=7.0
GNU C Library (glibc)=2.9
GNU C Library (glibc)=2.10
GNU C Library (glibc)=2.10.1
GNU C Library (glibc)=2.11
GNU C Library (glibc)=2.11.1
GNU C Library (glibc)=2.11.2
GNU C Library (glibc)=2.11.3
GNU C Library (glibc)=2.12
GNU C Library (glibc)=2.12.1
GNU C Library (glibc)=2.12.2
GNU C Library (glibc)=2.13
GNU C Library (glibc)=2.14
GNU C Library (glibc)=2.14.1
GNU C Library (glibc)=2.15
GNU C Library (glibc)=2.16
GNU C Library (glibc)=2.17
GNU C Library (glibc)=2.18
GNU C Library (glibc)=2.19
GNU C Library (glibc)=2.20
GNU C Library (glibc)=2.21
GNU C Library (glibc)=2.22

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2015-7547?

    CVE-2015-7547 has a critical severity level due to its potential for remote code execution via specially crafted DNS responses.

  • How do I fix CVE-2015-7547?

    To fix CVE-2015-7547, update the affected software packages to the patched versions provided by the software maintainers.

  • Which systems are affected by CVE-2015-7547?

    CVE-2015-7547 affects various systems including Debian 8.0, Ubuntu 12.04, 14.04, 15.10, and several versions of HP Helion OpenStack, SUSE Linux, and Red Hat Enterprise Linux.

  • What types of attacks can exploit CVE-2015-7547?

    CVE-2015-7547 can be exploited through remote attacks where specially crafted DNS responses can lead to stack-based buffer overflow.

  • What should I do if I cannot update my software to mitigate CVE-2015-7547?

    If you cannot update your software, consider implementing strict egress filtering and monitoring DNS traffic to reduce the risk of exploitation from CVE-2015-7547.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203