CVE-2015-7547
Published at:
-
18-02-2016 10:59
Last modified:
-
20-06-2022 09:15
Total changes:
-
11
Description
Common Vulnerability Scoring System (CVSS)
High
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
8.1
Base score
2.2
5.9
Exploitability score
Impact score
Verification logic
Reference
- USN-2900-1-Third Party Advisory
- https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=18665
- https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1293532
- [libc-alpha] 20160216 [PATCH] CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow-Mailing List, Vendor Advisory
- https://access.redhat.com/articles/2161461
- https://bto.bluecoat.com/security-advisory/sa114
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
- RHSA-2016:0176-Third Party Advisory
- openSUSE-SU-2016:0510-Third Party Advisory
- SUSE-SU-2016:0471-Third Party Advisory
- SUSE-SU-2016:0472-Third Party Advisory
- SUSE-SU-2016:0473-Third Party Advisory
- DSA-3481-Third Party Advisory
- SUSE-SU-2016:0470-Third Party Advisory
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- GLSA-201602-02-Third Party Advisory
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://kc.mcafee.com/corporate/index?page=content&id=SB10150
- openSUSE-SU-2016:0512-Third Party Advisory
- openSUSE-SU-2016:0511-Third Party Advisory
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
- HPSBGN03549-
- HPSBGN03582-
- HPSBGN03442-
- HPSBGN03551-
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
- HPSBGN03547-
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 83265-
- DSA-3480-
- RHSA-2016:0175-
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
- RHSA-2016:0225-
- http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- RHSA-2016:0277-
- https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
- http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- https://support.lenovo.com/us/en/product_security/len_5450
- http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
- VU#457759-
- http://www.vmware.com/security/advisories/VMSA-2016-0002.html
- FEDORA-2016-0f9e9a34ce-
- http://support.citrix.com/article/CTX206991
- 39454-
- 1035020-
- FEDORA-2016-0480defc94-
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- 40339-
- https://www.tenable.com/security/research/tra-2017-08
- https://security.netapp.com/advisory/ntap-20160217-0002/
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X-
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X-
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- 20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices-
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
- 20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series-
- http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
Keywords