8.1
CWE
119
Advisory Published
CVE Published
Updated

CVE-2015-7547: Buffer Overflow

First published: Tue Dec 22 2015(Updated: )

A stack-based buffer overflow was found in libresolv when invoked from nss_dns, allowing specially crafted DNS responses to seize control of EIP in the DNS client. The buffer overflow occurs in the functions send_dg (send datagram) and send_vc (send TCP) for the NSS module libnss_dns.so.2 when calling getaddrinfo with AF_UNSPEC family, or in some cases AF_INET6 family. The use of AF_UNSPEC (or AF_INET6 in some cases) triggers the low-level resolver code to send out two parallel queries for A and AAAA. A mismanagement of the buffers used for those queries could result in the response of a query writing beyond the alloca allocated buffer created by __res_nquery.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Debian Debian Linux=8.0
Canonical Ubuntu Linux=12.04
Canonical Ubuntu Linux=14.04
Canonical Ubuntu Linux=15.10
Hp Helion Openstack=1.1.1
Hp Helion Openstack=2.0.0
Hp Helion Openstack=2.1.0
Hp Server Migration Pack=7.5
Sophos Unified Threat Management Software=9.319
Sophos Unified Threat Management Software=9.355
SUSE Linux Enterprise Debuginfo=11.0-sp2
SUSE Linux Enterprise Debuginfo=11.0-sp3
SUSE Linux Enterprise Debuginfo=11.0-sp4
openSUSE openSUSE=13.2
SUSE Linux Enterprise Desktop=11.0-sp3
SUSE Linux Enterprise Desktop=11.0-sp4
SUSE Linux Enterprise Desktop=12
SUSE Linux Enterprise Desktop=12-sp1
SUSE Linux Enterprise Server=11.0-sp2
SUSE Linux Enterprise Server=11.0-sp3
Suse Linux Enterprise Server=11.0-sp3
SUSE Linux Enterprise Server=11.0-sp4
SUSE Linux Enterprise Server=12-sp1
SUSE Linux Enterprise Software Development Kit=11.0-sp3
SUSE Linux Enterprise Software Development Kit=11.0-sp4
SUSE Linux Enterprise Software Development Kit=12
SUSE Linux Enterprise Software Development Kit=12-sp1
SUSE SUSE Linux Enterprise Server=12
Oracle Exalogic Infrastructure=1.0
Oracle Exalogic Infrastructure=2.0
F5 BIG-IP Access Policy Manager=12.0.0
F5 BIG-IP Advanced Firewall Manager=12.0.0
F5 BIG-IP Analytics=12.0.0
F5 Big-ip Application Acceleration Manager=12.0.0
F5 BIG-IP Application Security Manager=12.0.0
F5 Big-ip Domain Name System=12.0.0
F5 Big-ip Link Controller=12.0.0
F5 Big-ip Local Traffic Manager=12.0.0
F5 Big-ip Policy Enforcement Manager=12.0.0
Oracle Fujitsu M10 Firmware<=2290
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Hpc Node=7.0
Redhat Enterprise Linux Hpc Node Eus=7.2
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Server Aus=7.2
Redhat Enterprise Linux Server Eus=7.2
Redhat Enterprise Linux Workstation=7.0
GNU glibc=2.9
GNU glibc=2.10
GNU glibc=2.10.1
GNU glibc=2.11
GNU glibc=2.11.1
GNU glibc=2.11.2
GNU glibc=2.11.3
GNU glibc=2.12
GNU glibc=2.12.1
GNU glibc=2.12.2
GNU glibc=2.13
GNU glibc=2.14
GNU glibc=2.14.1
GNU glibc=2.15
GNU glibc=2.16
GNU glibc=2.17
GNU glibc=2.18
GNU glibc=2.19
GNU glibc=2.20
GNU glibc=2.21
GNU glibc=2.22

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203