DNS: GNU C Library getaddrinfo CVE-2015-7547 Buffer Overflow 2

This signature detects an attempt to exploit a known vulnerability against DNS while parsing certain function implemented in libresolv library e.g. send_dg and send_vc functions. Successful exploitation could allow an attacker to cause a buffer overflow condition into the context of running DNS server which could lead to further attacks.

Extended Description

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

Affected Products

Oracle fujitsu_m10_firmware

Short Name
DNS:EXPLOIT:LIBCVE-2015-7547BO2
Severity
Major
Recommended
False
Recommended Action
None
Category
DNS
Keywords
2 Buffer C CVE-2015-7547 GNU Library Overflow getaddrinfo
Release Date
02/23/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3738
False Positive
Rarely
Vendors

Suse

F5

Redhat

Gnu

Sophos

Hp

Opensuse

Oracle

Debian

Canonical

CVSS Score

6.8

Found a potential security threat?