Ask the Community
Groups
CVE-2015-7547: glibc libresolve vulnerability - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2015-7547</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.<br><br>Unitrends risk assessment: Severity High<br><br>Remote code execution is possible, but not straightforward. It requires bypassing the security mitigations present on the system, such as ASLR.</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Fixed in CentOS6 update versions glibc-2.12-1.166.el6_7.7 and later.<br><br>To update to the new version of glibc with the fix, contact support for the EAPP-601 security update.<br><br>CentOS5 systems are not affected.</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2FCVE-2015-7547%250D%250Ahttps%3A%2F%2Frhn.redhat.com%2Ferrata%2FRHSA-2016-0175.html%250D%250Ahttps%3A%2F%2Fgoogleonlinesecurity.blogspot.com%2F2016%2F02%2Fcve-2015-7547-glibcgetaddrinfo-stack.html">https://access.redhat.com/security/cve/CVE-2015-7547 https://rhn.redhat.com/errata/RHSA-2016-0175.html https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibcgetaddrinfo-stack.html</a></li></ul> </article> </main>