CVE-2015-7547
HIGH EXPLOITEDGNU C Library <2.23 - Buffer Overflow
Title source: llmDescription
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Exploits (15)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textdoslinux
https://www.exploit-db.com/exploits/39454
github
WORKING POC
31 stars
by OpenSISE · cpoc
https://github.com/OpenSISE/CVE_PoC_Collect/tree/master/RCE/android/CVE-2015-7547
nomisec
STUB
by Amilaperera12 · poc
https://github.com/Amilaperera12/Glibc-Vulnerability-Exploit-CVE-2015-7547
References (75)
... and 55 more
Scores
CVSS v3
8.1
EPSS
0.9395
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-08-17
CWE
CWE-119
Status
published
Products (50)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
15.10
debian/debian_linux
8.0
f5/big-ip_access_policy_manager
12.0.0
f5/big-ip_advanced_firewall_manager
12.0.0
f5/big-ip_analytics
12.0.0
f5/big-ip_application_acceleration_manager
12.0.0
f5/big-ip_application_security_manager
12.0.0
f5/big-ip_domain_name_system
12.0.0
... and 40 more
Published
Feb 18, 2016
Tracked Since
Feb 18, 2026