ID

VAR-201602-0004


CVE

CVE-2015-7547


TITLE

GNU glibc getaddrinfo () stack buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2016-01100

DESCRIPTION

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. GNU glibc is an open source C language compiler released under the LGPL license agreement. It is an implementation of the C library in the Linux operating system. There is a stack overflow vulnerability in the getaddrinfo function in glibc when processing a specific DNS response packet. An attacker can use the vulnerability to launch an attack on a Linux host or related devices by constructing a malicious DNS service or using a man-in-the-middle attack, which results in remote code execution and can be obtained. User terminal control. For HPE Helion OpenStack 2.0.x the recommended update path is to download and upgrade to Helion OpenStack 2.1.2 or a subsequent later version . This can be done as follows: Go to https://helion.hpwsportal.com and download HPE Helion OpenStack 2.1.2 Follow these http://docs.hpcloud.com/#helion/installation/upgrade20_to_212.html deployment steps to upgrade to 2.1.2 HPE Helion OpenStack 2.0.x customers can also choose to install the 2.0.2 release, which only includes the changes mentioned in the release notes http://docs.hpcloud.com/#helion/releasenotes202.html . This can be done as follows: Go to https://helion.hpwsportal.com and download HPE Helion OpenStack 2.0.2 Follow these http://docs.hpcloud.com/#helion/installation/upgrade20_to_202.html deployment steps to upgrade to 2.0.2 To patch HPE Helion OpenStack 2.1.0: Go to https://helion.hpwsportal.com and download HPE Helion OpenStack 2.1.2 or a subsequent later version . SEC Consult Vulnerability Lab Security Advisory < 20190904-0 > ======================================================================= title: Multiple vulnerabilities product: Cisco RV340, Cisco RV340W, Cisco RV345, Cisco RV345P, Cisco RV260, Cisco RV260P, Cisco RV260W, Cisco 160, Cisco 160W vulnerable version: Cisco RV34X - 1.0.02.16, Cisco RV16X/26X - 1.0.00.15 fixed version: see "Solution" CVE number: - impact: High homepage: https://www.cisco.com/ found: 2019-05-15 by: T. Weber, S. Viehböck (Office Vienna) IoT Inspector SEC Consult Vulnerability Lab An integrated part of SEC Consult Europe | Asia | North America https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "Securely connecting your small business to the outside world is as important as connecting your internal network devices to one another. Cisco Small Business RV Series Routers offer virtual private networking (VPN) technology so your remote workers can connect to your network through a secure Internet pathway." Source: https://www.cisco.com/c/en/us/products/routers/small-business-rv-series-routers/index.html Business recommendation: ------------------------ We want to thank Cisco for the very quick and professional response and great coordination. Customers are urged to update the firmware of their devices. Vulnerability overview/description: ----------------------------------- 1) Hardcoded Credentials The device contains hardcoded users and passwords which can be used to login via SSH on an emulated device at least. During the communication with Cisco it turned out that: "Accounts like the 'debug-admin' and 'root' can not be accessed from console port, CLI or webui". Therefore, these accounts had no real functionality and cannot be used for malicious actions. 2) Known GNU glibc Vulnerabilities The used GNU glibc in version 2.19 is outdated and contains multiple known vulnerabilities. The outdated version was found by IoT Inspector. One of the discovered vulnerabilities (CVE-2015-7547, "getaddrinfo() buffer overflow") was verified by using the MEDUSA scalable firmware runtime. 3) Known BusyBox Vulnerabilities The used BusyBox toolkit in version 1.23.2 is outdated and contains multiple known vulnerabilities. The outdated version was found by IoT Inspector. One of the discovered vulnerabilities (CVE-2017-16544) was verified by using the MEDUSA scaleable firmware runtime. 4) Multiple Vulnerabilities - IoT Inspector Report Further information can be found in IoT Inspector report: https://r.sec-consult.com/ciscoiot Proof of concept: ----------------- 1) Hardcoded Credentials The following hardcoded hashes were found in the 'shadow' file of the firmware: root:$1$hPNSjUZA$7eKqEpqVYltt9xJ6f0OGf0:15533:0:99999:7::: debug-admin:$1$.AAm0iJ4$na9wZwly9pSrdS8MhcGKw/:15541:0:99999:7::: [...] The undocumented user 'debug-admin' is also contained in this file. Starting the dropbear daemon as background process on emulated firmware: ------------------------------------------------------------------------------- # dropbear -E # [1109] <timestamp> Running in background # # [1112] <timestamp> Child connection from <IP>:52718 [1112] <timestamp> /var must be owned by user or root, and not writable by others [1112] <timestamp> Password auth succeeded for 'debug-admin' from <IP>:52718 ------------------------------------------------------------------------------- Log on via another host connected to the same network. For this PoC the password of the debug-admin was changed in the 'shadow' file. ------------------------------------------------------------------------------- [root@localhost medusa]# ssh debug-admin@<IP> /bin/ash -i debug-admin@<IP>'s password: /bin/ash: can't access tty; job control turned off BusyBox v1.23.2 (2018-11-21 18:22:56 IST) built-in shell (ash) /tmp $ ------------------------------------------------------------------------------- The 'debug-admin' user has the same privileges like 'root'. This can be determined from the corresponding sudoers file in the firmware: [...] ## User privilege specification ## root ALL=(ALL) ALL debug-admin ALL=(ALL) ALL ## Uncomment to allow members of group wheel to execute any command # %wheel ALL=(ALL) ALL [...] During the communication with Cisco it turned out that: "Accounts like the 'debug-admin' and 'root' can not be accessed from console port, CLI or webui". Therefore, these accounts had no real functionality and cannot be used for malicious actions. 2) Known GNU glibc Vulnerabilities GNU glibc version 2.19 contains multiple CVEs like: CVE-2014-4043, CVE-2014-9402, CVE-2014-9761, CVE-2014-9984, CVE-2015-1472, CVE-2015-5277, CVE-2015-8778, CVE-2015-8779, CVE-2017-1000366 and more. The getaddrinfo() buffer overflow vulnerability was checked with the help of the exploit code from https://github.com/fjserna/CVE-2015-7547. It was compiled and executed on the emulated device to test the system. # python cve-2015-7547-poc.py & [1] 961 # chroot /medusa_rootfs/ bin/ash BusyBox v1.23.2 (2018-11-21 18:22:56 IST) built-in shell (ash) # gdb cve-2015-7547_glibc_getaddrinfo [...] [UDP] Total Data len recv 36 [UDP] Total Data len recv 36 Connected with 127.0.0.1:41782 [TCP] Total Data len recv 76 [TCP] Request1 len recv 36 [TCP] Request2 len recv 36 Cannot access memory at address 0x4 Program received signal SIGSEGV, Segmentation fault. 0x76f1fd58 in ?? () from /lib/libc.so.6 (gdb) References: https://security.googleblog.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html https://github.com/fjserna/CVE-2015-7547 3) Known BusyBox Vulnerabilities BusyBox version 1.23.2 contains multiple CVEs like: CVE-2016-2148, CVE-2016-6301, CVE-2015-9261, CVE-2016-2147, CVE-2018-20679, CVE-2017-16544 and CVE-2019-5747. The BusyBox shell autocompletion vulnerability (CVE-2017-16544) was verified on an emulated device: A file with the name "\ectest\n\e]55;test.txt\a" was created to trigger the vulnerability. ------------------------------------------------------------------------------- # ls "pressing <TAB>" test ]55;test.txt # ------------------------------------------------------------------------------- 4) Multiple Vulnerabilities - IoT Inspector Report Further information can be found in IoT Inspector report: https://r.sec-consult.com/ciscoiot The summary is below: IoT Inspector Vulnerability #1 BusyBox CVE entries Outdated BusyBox version is affected by 7 published CVEs. IoT Inspector Vulnerability #2 curl CVE entries Outdated curl version is affected by 35 published CVEs. IoT Inspector Vulnerability #3 GNU glibc CVE entries Outdated GNU glibc version is affected by 44 published CVEs. IoT Inspector Vulnerability #4 GNU glibc getaddrinfo() buffer overflow Outdated GNU glibc version is affected by CVE-2015-7547. IoT Inspector Vulnerability #5 Hardcoded password hashes Firmware contains multiple hardcoded credentials. IoT Inspector Vulnerability #6 Linux Kernel CVE entries Outdated Linux Kernel version affected by 512 published CVEs. IoT Inspector Vulnerability #7 MiniUPnPd CVE entries Outdated MiniUPnPd version affected by 2 published CVEs. IoT Inspector Vulnerability #8 Dnsmasq CVE entries Outdated MiniUPnPd version affected by 1 published CVE. IoT Inspector Vulnerability #9 Linux Kernel Privilege Escalation “pp_key” Outdated Linux Kernel version is affected by CVE-2015-7547. IoT Inspector Vulnerability #10 OpenSSL CVE entries Outdated OpenSSL version affected by 6 published CVEs. Vulnerable / tested versions: ----------------------------- The following firmware versions have been tested with IoT Inspector and firmware emulation techniques: Cisco RV340 / 1.0.02.16 Cisco RV340W / 1.0.02.16 Cisco RV345 / 1.0.02.16 Cisco RV345P / 1.0.02.16 The following firmware versions have been tested with IoT Inspector only: Cisco RV260 / 1.0.00.15 Cisco RV260P / 1.0.00.15 Cisco RV260W / 1.0.00.15 Cisco RV160 / 1.0.00.15 Cisco RV160P / 1.0.00.15 The firmware was obtained from the vendor website: https://software.cisco.com/download/home/286287791/type/282465789/release/1.0.02.16 https://software.cisco.com/download/home/286316464/type/282465789/release/1.0.00.15 Vendor contact timeline: ------------------------ 2019-05-15: Contacting vendor through psirt@cisco.com. 2019-05-16: Vendor confirmed the receipt. 2019-05-2019-08: Periodic updates about the investigation from the vendor. Clarification which of the reported issues will be fixed. 2019-08-20: The vendor proposed the next possible publication date for the advisory for 2019-09-04. The vendor added the RV160 and RV260 router series to be vulnerable to the same issues too. 2019-09-04: Coordinated advisory release. Solution: --------- Upgrade to the newest available firmware version. Additionally, the vendor provides the following security notice: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190904-sb-vpnrouter Workaround: ----------- None. Advisory URL: ------------- https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Vulnerability Lab SEC Consult Europe | Asia | North America About SEC Consult Vulnerability Lab The SEC Consult Vulnerability Lab is an integrated part of SEC Consult. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/career/index.html Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/contact/index.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF T. Weber / @2019 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05128937 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05128937 Version: 1 HPSBST03598 rev.1 - HPE 3PAR OS using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-05-11 Last Updated: 2016-05-11 Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY HPE 3PAR OS has addressed stack based buffer overflows in glibc's implementation of getaddrinfo(). This vulnerability could be remotely exploited to cause Denial of Service (DoS) or allow execution of arbitrary code on the host with the permissions of a user running glibc library. References: - CVE-2015-7547 - PSRT110105 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HPE 3PAR OS versions 3.1.3 and later, prior to 3.2.1 MU5 and 3.2.2 MU2 using glibc BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-7547 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates and mitigation information to resolve the vulnerability in 3PAR OS using glibc. + 3PAR OS 3.2.1 MU5 and 3.2.2 MU2 - HPE recommends prior impacted versions update to 3PAR OS 3.2.1 MU 5 or 3.2.2 MU2. - glibc has been updated in these releases to resolve the glibc vulnerability. + 3PAR OS 3.1.3 is also vulnerable but will not be fixed. **Mitigation:** The best protection to guard against exploitation of this vulnerability is to securely configure and operate the storage array in accordance with the *HPE 3PAR Configuration Guidelines* documentation. Please contact HPE Technical Support for assistance. HISTORY Version:1 (rev.1) - 11 May 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJXM6AtAAoJEGIGBBYqRO9/QioH/RZSc5YPunh3BS9OpwmTeeib 2B1ScjFu60S0m4w66Zpy3j4K4OX0o1VyXLmJQogGAS0E+/rnpAiMxjUWJA7DMQ3W AMRtz7Vpbrq2oz7v/q3/w2HkPpMAq3UOrTseN9sNPRzuTCVdsY4LZw/qVlpXWPvb 1Z+M5s0LMk1Y8+GSjx3+4E+LmqUBccn1HfCDH4MddvBxM+HvFepAxnzsAyLc+lFM 4jgch19LAbteSbPIubEPUyJIX0Ync7JF4AXdg2dHhOWZLV9rcHbijDr+VUo1sXYK xLMdC6RH+VpGqUmLd2auoS8rhRn58ytxRSnqkOQ2a6vcOsUyHl/3RJzAOmH52Lg= =pCEE -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201602-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: GNU C Library: Multiple vulnerabilities Date: February 17, 2016 Bugs: #516884, #517082, #521932, #529982, #532874, #538090, #538814, #540070, #541246, #541542, #547296, #552692, #574880 ID: 201602-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in the GNU C library, the worst allowing for remote execution of arbitrary code. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 sys-libs/glibc < 2.21-r2 >= 2.21-r2 Description =========== Multiple vulnerabilities have been discovered in the GNU C Library: * The Google Security Team and Red Hat discovered a stack-based buffer overflow in the send_dg() and send_vc() functions due to a buffer mismanagement when getaddrinfo() is called with AF_UNSPEC (CVE-2015-7547). * The strftime() function access invalid memory when passed out-of-range data, resulting in a crash (CVE-2015-8776). * An integer overflow was found in the __hcreate_r() function (CVE-2015-8778). * Multiple unbounded stack allocations were found in the catopen() function (CVE-2015-8779). Please review the CVEs referenced below for additional vulnerabilities that had already been fixed in previous versions of sys-libs/glibc, for which we have not issued a GLSA before. Impact ====== A remote attacker could exploit any application which performs host name resolution using getaddrinfo() in order to execute arbitrary code or crash the application. The other vulnerabilities can possibly be exploited to cause a Denial of Service or leak information. Workaround ========== A number of mitigating factors for CVE-2015-7547 have been identified. Please review the upstream advisory and references below. Resolution ========== All GNU C Library users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.21-r2" It is important to ensure that no running process uses the old glibc anymore. The easiest way to achieve that is by rebooting the machine after updating the sys-libs/glibc package. Note: Should you run into compilation failures while updating, please see bug 574948. References ========== [ 1 ] CVE-2013-7423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7423 [ 2 ] CVE-2014-0475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475 [ 3 ] CVE-2014-0475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0475 [ 4 ] CVE-2014-5119 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5119 [ 5 ] CVE-2014-6040 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6040 [ 6 ] CVE-2014-7817 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7817 [ 7 ] CVE-2014-8121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8121 [ 8 ] CVE-2014-9402 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9402 [ 9 ] CVE-2015-1472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1472 [ 10 ] CVE-2015-1781 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1781 [ 11 ] CVE-2015-7547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7547 [ 12 ] CVE-2015-8776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8776 [ 13 ] CVE-2015-8778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8778 [ 14 ] CVE-2015-8779 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8779 [ 15 ] Google Online Security Blog: "CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow" https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-geta= ddrinfo-stack.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201602-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.25

sources: NVD: CVE-2015-7547 // CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // PACKETSTORM: 137351 // PACKETSTORM: 137112 // PACKETSTORM: 137292 // PACKETSTORM: 154361 // PACKETSTORM: 136988 // PACKETSTORM: 136976 // PACKETSTORM: 135971 // PACKETSTORM: 135810

AFFECTED PRODUCTS

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 2.0

vendor:gnumodel:glibcscope:eqversion:2.21

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.11.1

Trust: 1.0

vendor:sophosmodel:unified threat management softwarescope:eqversion:9.355

Trust: 1.0

vendor:susemodel:linux enterprise debuginfoscope:eqversion:11.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.10

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.11

Trust: 1.0

vendor:hpmodel:helion openstackscope:eqversion:2.1.0

Trust: 1.0

vendor:hpmodel:helion openstackscope:eqversion:2.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.11.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.17

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:12.0.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:12.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.16

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.12.1

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.22

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.19

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:12.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.18

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.20

Trust: 1.0

vendor:oraclemodel:exalogic infrastructurescope:eqversion:1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.9

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.10

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.11.2

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.15

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.12

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.14.1

Trust: 1.0

vendor:hpmodel:helion openstackscope:eqversion:1.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:12.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.14

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.12.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:sophosmodel:unified threat management softwarescope:eqversion:9.319

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:12.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:12.0.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11.0

Trust: 1.0

vendor:oraclemodel:exalogic infrastructurescope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:12.0.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.10.1

Trust: 1.0

vendor:oraclemodel:fujitsu m10scope:lteversion:2290

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.13

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:hpmodel:server migration packscope:eqversion:7.5

Trust: 1.0

vendor:gnumodel:glibcscope:gtversion:2.9

Trust: 0.6

vendor:siemensmodel:apescope: - version: -

Trust: 0.6

vendor:siemensmodel:basic rtscope:eqversion:v13

Trust: 0.6

vendor:siemensmodel:rox ii osscope:gteversion:v2.3.0<=v2.9.0

Trust: 0.6

vendor:siemensmodel:scalance m-800 s615scope:eqversion:/

Trust: 0.6

vendor:siemensmodel:sinema remote connectscope:ltversion:v1.2

Trust: 0.6

sources: CNVD: CNVD-2016-01100 // NVD: CVE-2015-7547

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7547
value: HIGH

Trust: 1.0

CNVD: CNVD-2016-01100
value: HIGH

Trust: 0.6

VULHUB: VHN-85508
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7547
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2016-01100
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:M/AU:N/C:C/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-85508
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7547
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // NVD: CVE-2015-7547

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-85508 // NVD: CVE-2015-7547

THREAT TYPE

remote

Trust: 0.2

sources: PACKETSTORM: 137292 // PACKETSTORM: 135810

TYPE

overflow, arbitrary

Trust: 0.4

sources: PACKETSTORM: 137351 // PACKETSTORM: 137112 // PACKETSTORM: 136976 // PACKETSTORM: 135971

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-85508

PATCH

title:Patch for GNU glibc getaddrinfo () stack buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/71529

Trust: 0.6

sources: CNVD: CNVD-2016-01100

EXTERNAL IDS

db:NVDid:CVE-2015-7547

Trust: 2.5

db:BIDid:83265

Trust: 1.7

db:PACKETSTORMid:154361

Trust: 1.2

db:EXPLOIT-DBid:39454

Trust: 1.1

db:EXPLOIT-DBid:40339

Trust: 1.1

db:MCAFEEid:SB10150

Trust: 1.1

db:PACKETSTORMid:167552

Trust: 1.1

db:PACKETSTORMid:164014

Trust: 1.1

db:PACKETSTORMid:135802

Trust: 1.1

db:SECTRACKid:1035020

Trust: 1.1

db:CERT/CCid:VU#457759

Trust: 1.1

db:PULSESECUREid:SA40161

Trust: 1.1

db:TENABLEid:TRA-2017-08

Trust: 1.1

db:ICS CERTid:ICSA-16-103-01

Trust: 1.1

db:SIEMENSid:SSA-301706

Trust: 0.6

db:CNVDid:CNVD-2016-01100

Trust: 0.6

db:PACKETSTORMid:135971

Trust: 0.2

db:PACKETSTORMid:136988

Trust: 0.2

db:PACKETSTORMid:136976

Trust: 0.2

db:PACKETSTORMid:137351

Trust: 0.2

db:PACKETSTORMid:137112

Trust: 0.2

db:PACKETSTORMid:136808

Trust: 0.1

db:PACKETSTORMid:137497

Trust: 0.1

db:PACKETSTORMid:135791

Trust: 0.1

db:PACKETSTORMid:135856

Trust: 0.1

db:PACKETSTORMid:138068

Trust: 0.1

db:PACKETSTORMid:136881

Trust: 0.1

db:PACKETSTORMid:135853

Trust: 0.1

db:PACKETSTORMid:135911

Trust: 0.1

db:PACKETSTORMid:136325

Trust: 0.1

db:PACKETSTORMid:135801

Trust: 0.1

db:PACKETSTORMid:136985

Trust: 0.1

db:PACKETSTORMid:135800

Trust: 0.1

db:PACKETSTORMid:135789

Trust: 0.1

db:PACKETSTORMid:138601

Trust: 0.1

db:PACKETSTORMid:136048

Trust: 0.1

db:CNNVDid:CNNVD-201602-348

Trust: 0.1

db:SEEBUGid:SSVID-90749

Trust: 0.1

db:VULHUBid:VHN-85508

Trust: 0.1

db:PACKETSTORMid:137292

Trust: 0.1

db:PACKETSTORMid:135810

Trust: 0.1

sources: CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // PACKETSTORM: 137351 // PACKETSTORM: 137112 // PACKETSTORM: 137292 // PACKETSTORM: 154361 // PACKETSTORM: 136988 // PACKETSTORM: 136976 // PACKETSTORM: 135971 // PACKETSTORM: 135810 // NVD: CVE-2015-7547

REFERENCES

url:https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html

Trust: 1.7

url:https://security.gentoo.org/glsa/201602-02

Trust: 1.2

url:http://www.securitytracker.com/id/1035020

Trust: 1.1

url:http://seclists.org/fulldisclosure/2019/sep/7

Trust: 1.1

url:https://seclists.org/bugtraq/2019/sep/7

Trust: 1.1

url:http://seclists.org/fulldisclosure/2021/sep/0

Trust: 1.1

url:http://seclists.org/fulldisclosure/2022/jun/36

Trust: 1.1

url:https://www.exploit-db.com/exploits/39454/

Trust: 1.1

url:https://www.exploit-db.com/exploits/40339/

Trust: 1.1

url:http://www.securityfocus.com/bid/83265

Trust: 1.1

url:http://www.debian.org/security/2016/dsa-3480

Trust: 1.1

url:http://www.debian.org/security/2016/dsa-3481

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2016-february/177404.html

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2016-february/177412.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-0175.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-0176.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-0225.html

Trust: 1.1

url:http://rhn.redhat.com/errata/rhsa-2016-0277.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html

Trust: 1.1

url:http://ubuntu.com/usn/usn-2900-1

Trust: 1.1

url:https://www.kb.cert.org/vuls/id/457759

Trust: 1.1

url:http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow

Trust: 1.1

url:http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-stack-based-buffer-overflow.html

Trust: 1.1

url:http://packetstormsecurity.com/files/154361/cisco-device-hardcoded-credentials-gnu-glibc-busybox.html

Trust: 1.1

url:http://packetstormsecurity.com/files/164014/moxa-command-injection-cross-site-scripting-vulnerable-software.html

Trust: 1.1

url:http://packetstormsecurity.com/files/167552/nexans-ftto-gigaswitch-outdated-components-hardcoded-backdoor.html

Trust: 1.1

url:http://support.citrix.com/article/ctx206991

Trust: 1.1

url:http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow

Trust: 1.1

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.1

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Trust: 1.1

url:http://www.vmware.com/security/advisories/vmsa-2016-0002.html

Trust: 1.1

url:https://access.redhat.com/articles/2161461

Trust: 1.1

url:https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/

Trust: 1.1

url:https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/

Trust: 1.1

url:https://bto.bluecoat.com/security-advisory/sa114

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1293532

Trust: 1.1

url:https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Trust: 1.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05028479

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04989404

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05008367

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05053211

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05073516

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05098877

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05125672

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128937

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05130958

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05140858

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05176716

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05212266

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05376917

Trust: 1.1

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.1

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.1

url:https://ics-cert.us-cert.gov/advisories/icsa-16-103-01

Trust: 1.1

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40161

Trust: 1.1

url:https://security.netapp.com/advisory/ntap-20160217-0002/

Trust: 1.1

url:https://sourceware.org/bugzilla/show_bug.cgi?id=18665

Trust: 1.1

url:https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html

Trust: 1.1

url:https://support.lenovo.com/us/en/product_security/len_5450

Trust: 1.1

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17

Trust: 1.1

url:https://www.tenable.com/security/research/tra-2017-08

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=145596041017029&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=145857691004892&w=2

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10150

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=145672440608228&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=146161017210491&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=145690841819314&w=2

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2015-7547

Trust: 0.8

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-301706.pdf

Trust: 0.6

url:https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Trust: 0.6

url:https://isc.sans.edu/diary/cve-2015-7547

Trust: 0.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.6

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.6

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-0728

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1472

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-9402

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8778

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-8779

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=145690841819314&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145596041017029&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145672440608228&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145857691004892&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=146161017210491&amp;w=2

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10150

Trust: 0.1

url:https://helion.hpwsportal.com

Trust: 0.1

url:http://docs.hpcloud.com/#helion/installation/upgrade20_to_202.html

Trust: 0.1

url:http://docs.hpcloud.com/#helion/releasenotes202.html

Trust: 0.1

url:http://docs.hpcloud.com/#helion/installation/upgrade20_to_212.html

Trust: 0.1

url:http://docs.hpcloud.com/#helion/installation/upgrade_to_212.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-6750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0705

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3237

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2015

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2017

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4969

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3508

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3509

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3511

Trust: 0.1

url:http://www.hpe.com/info/insightcontrol

Trust: 0.1

url:https://github.com/fjserna/cve-2015-7547

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6301

Trust: 0.1

url:https://www.cisco.com/c/en/us/products/routers/small-business-rv-series-routers/index.html

Trust: 0.1

url:https://r.sec-consult.com/ciscoiot

Trust: 0.1

url:https://security.googleblog.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Trust: 0.1

url:https://github.com/fjserna/cve-2015-7547.

Trust: 0.1

url:https://www.sec-consult.com/en/career/index.html

Trust: 0.1

url:https://www.cisco.com/

Trust: 0.1

url:https://www.sec-consult.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5277

Trust: 0.1

url:https://twitter.com/sec_consult

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190904-sb-vpnrouter

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-9261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9984

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9761

Trust: 0.1

url:http://blog.sec-consult.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4043

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000366

Trust: 0.1

url:https://www.sec-consult.com/en/vulnerability-lab/advisories/index.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16544

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2148

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20679

Trust: 0.1

url:https://software.cisco.com/download/home/286316464/type/282465789/release/1.0.00.15

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5747

Trust: 0.1

url:https://www.sec-consult.com/en/contact/index.html

Trust: 0.1

url:https://software.cisco.com/download/home/286287791/type/282465789/release/1.0.02.16

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-9402

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-geta=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7423

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-7817

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8121

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-6040

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8778

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0475

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1781

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8776

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-7817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-5119

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8121

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-6040

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8779

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8776

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-7423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-5119

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-1472

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // PACKETSTORM: 137351 // PACKETSTORM: 137112 // PACKETSTORM: 137292 // PACKETSTORM: 154361 // PACKETSTORM: 136988 // PACKETSTORM: 136976 // PACKETSTORM: 135971 // PACKETSTORM: 135810 // NVD: CVE-2015-7547

CREDITS

HP

Trust: 0.6

sources: PACKETSTORM: 137351 // PACKETSTORM: 137112 // PACKETSTORM: 137292 // PACKETSTORM: 136988 // PACKETSTORM: 136976 // PACKETSTORM: 135971

SOURCES

db:CNVDid:CNVD-2016-01100
db:VULHUBid:VHN-85508
db:PACKETSTORMid:137351
db:PACKETSTORMid:137112
db:PACKETSTORMid:137292
db:PACKETSTORMid:154361
db:PACKETSTORMid:136988
db:PACKETSTORMid:136976
db:PACKETSTORMid:135971
db:PACKETSTORMid:135810
db:NVDid:CVE-2015-7547

LAST UPDATE DATE

2025-12-22T22:00:02.674000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01100date:2016-07-12T00:00:00
db:VULHUBid:VHN-85508date:2023-02-12T00:00:00
db:NVDid:CVE-2015-7547date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01100date:2016-02-18T00:00:00
db:VULHUBid:VHN-85508date:2016-02-18T00:00:00
db:PACKETSTORMid:137351date:2016-06-08T13:13:00
db:PACKETSTORMid:137112date:2016-05-18T23:31:21
db:PACKETSTORMid:137292date:2016-06-02T19:12:12
db:PACKETSTORMid:154361date:2019-09-04T18:32:22
db:PACKETSTORMid:136988date:2016-05-13T16:14:06
db:PACKETSTORMid:136976date:2016-05-12T16:07:19
db:PACKETSTORMid:135971date:2016-02-26T19:32:00
db:PACKETSTORMid:135810date:2016-02-17T23:53:39
db:NVDid:CVE-2015-7547date:2016-02-18T21:59:00.120