#VU2544 Stack-based buffer overflow in Glibc - CVE-2015-7547

 

#VU2544 Stack-based buffer overflow in Glibc - CVE-2015-7547

Published: December 21, 2016 / Updated: May 12, 2020


Vulnerability identifier: #VU2544
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2015-7547
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Glibc
Software vendor:
GNU

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to stack-based buffer overflow in in the (1) send_dg and (2) send_vc functions in the libresolv library. A remote attacker can use a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module, cause memory corruption and execute arbitrary code.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 2.23.

External links