ID

VAR-201602-0004


CVE

CVE-2015-7547


TITLE

glibc vulnerable to stack buffer overflow in DNS resolver

Trust: 0.8

sources: CERT/CC: VU#457759

DESCRIPTION

Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. GNU glibc is an open source C language compiler released under the LGPL license agreement. It is an implementation of the C library in the Linux operating system. An attacker can use the vulnerability to launch an attack on a Linux host or related devices by constructing a malicious DNS service or using a man-in-the-middle attack, which results in remote code execution and can be obtained. User terminal control. There is a buffer error vulnerability in the 'send_dg' and 'send_vc' functions in the resolv/res_send.c file of glibc version 2.9 to 2.22. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05028479 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05028479 Version: 2 HPSBGN03442 rev.2 - HP Helion OpenStack using glibc, Remote Denial of Service (DoS), Arbitrary Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-03-01 Last Updated: 2016-06-06 Potential Security Impact: Remote Arbitrary Code Execution, Denial of Service (DoS) Source: Hewlett Packard Enterprise, Product Security Response Team VULNERABILITY SUMMARY HPE Helion OpenStack has addressed stack based buffer overflows in glibc's implementation of getaddrinfo(). References: CVE-2015-7547 PSRT110041 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Helion OpenStack 1.1.1, 2.0.0, 2.1.0 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2015-7547 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software update to resolve the vulnerability in HPE Helion OpenStack. For HPE Helion OpenStack 1.1.1: Helion OpenStack 1.1.1 customers should engage with HPE Helion Professional Services via existing support channels to assist with the upgrade. For HPE Helion OpenStack 2.0.x the recommended update path is to download and upgrade to Helion OpenStack 2.1.2 or a subsequent later version . This can be done as follows: Go to https://helion.hpwsportal.com and download HPE Helion OpenStack 2.1.2 Follow these http://docs.hpcloud.com/#helion/installation/upgrade20_to_212.html deployment steps to upgrade to 2.1.2 HPE Helion OpenStack 2.0.x customers can also choose to install the 2.0.2 release, which only includes the changes mentioned in the release notes http://docs.hpcloud.com/#helion/releasenotes202.html . This can be done as follows: Go to https://helion.hpwsportal.com and download HPE Helion OpenStack 2.0.2 Follow these http://docs.hpcloud.com/#helion/installation/upgrade20_to_202.html deployment steps to upgrade to 2.0.2 To patch HPE Helion OpenStack 2.1.0: Go to https://helion.hpwsportal.com and download HPE Helion OpenStack 2.1.2 or a subsequent later version . Follow these http://docs.hpcloud.com/#helion/installation/upgrade_to_212.html deployment steps to upgrade to 2.1.2 HISTORY Version:1 (rev.1) - 1 March 2016 Initial release Version:2 (rev.2) - 6 June 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - Upgrade HP OneView to patch version 2.00.07. Relevant releases/architectures: RHEL 7-based RHEV-H - noarch RHEV Hypervisor for RHEL-6 - noarch 3. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: glibc security and bug fix update Advisory ID: RHSA-2016:0176-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0176.html Issue date: 2016-02-16 CVE Names: CVE-2015-5229 CVE-2015-7547 ===================================================================== 1. Summary: Updated glibc packages that fix two security issues and two bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547) It was discovered that the calloc implementation in glibc could return memory areas which contain non-zero bytes. This could result in unexpected application behavior such as hangs or crashes. (CVE-2015-5229) The CVE-2015-7547 issue was discovered by the Google Security Team and Red Hat. Red Hat would like to thank Jeff Layton for reporting the CVE-2015-5229 issue. This update also fixes the following bugs: * The existing implementation of the "free" function causes all memory pools beyond the first to return freed memory directly to the operating system as quickly as possible. This can result in performance degradation when the rate of free calls is very high. The first memory pool (the main pool) does provide a method to rate limit the returns via M_TRIM_THRESHOLD, but this method is not available to subsequent memory pools. With this update, the M_TRIM_THRESHOLD method is extended to apply to all memory pools, which improves performance for threads with very high amounts of free calls and limits the number of "madvise" system calls. The change also increases the total transient memory usage by processes because the trim threshold must be reached before memory can be freed. To return to the previous behavior, you can either set M_TRIM_THRESHOLD using the "mallopt" function, or set the MALLOC_TRIM_THRESHOLD environment variable to 0. (BZ#1298930) * On the little-endian variant of 64-bit IBM Power Systems (ppc64le), a bug in the dynamic loader could cause applications compiled with profiling enabled to fail to start with the error "monstartup: out of memory". The bug has been corrected and applications compiled for profiling now start correctly. (BZ#1298956) All glibc users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1256285 - CVE-2015-5229 glibc: calloc may return non-zero memory 1293532 - CVE-2015-7547 glibc: getaddrinfo stack-based buffer overflow 1298956 - "monstartup: out of memory" on PPC64LE [rhel-7.2.z] 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: glibc-2.17-106.el7_2.4.src.rpm x86_64: glibc-2.17-106.el7_2.4.i686.rpm glibc-2.17-106.el7_2.4.x86_64.rpm glibc-common-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-devel-2.17-106.el7_2.4.i686.rpm glibc-devel-2.17-106.el7_2.4.x86_64.rpm glibc-headers-2.17-106.el7_2.4.x86_64.rpm glibc-utils-2.17-106.el7_2.4.x86_64.rpm nscd-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-static-2.17-106.el7_2.4.i686.rpm glibc-static-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: glibc-2.17-106.el7_2.4.src.rpm x86_64: glibc-2.17-106.el7_2.4.i686.rpm glibc-2.17-106.el7_2.4.x86_64.rpm glibc-common-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-devel-2.17-106.el7_2.4.i686.rpm glibc-devel-2.17-106.el7_2.4.x86_64.rpm glibc-headers-2.17-106.el7_2.4.x86_64.rpm glibc-utils-2.17-106.el7_2.4.x86_64.rpm nscd-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-static-2.17-106.el7_2.4.i686.rpm glibc-static-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: glibc-2.17-106.el7_2.4.src.rpm ppc64: glibc-2.17-106.el7_2.4.ppc.rpm glibc-2.17-106.el7_2.4.ppc64.rpm glibc-common-2.17-106.el7_2.4.ppc64.rpm glibc-debuginfo-2.17-106.el7_2.4.ppc.rpm glibc-debuginfo-2.17-106.el7_2.4.ppc64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.ppc.rpm glibc-debuginfo-common-2.17-106.el7_2.4.ppc64.rpm glibc-devel-2.17-106.el7_2.4.ppc.rpm glibc-devel-2.17-106.el7_2.4.ppc64.rpm glibc-headers-2.17-106.el7_2.4.ppc64.rpm glibc-utils-2.17-106.el7_2.4.ppc64.rpm nscd-2.17-106.el7_2.4.ppc64.rpm ppc64le: glibc-2.17-106.el7_2.4.ppc64le.rpm glibc-common-2.17-106.el7_2.4.ppc64le.rpm glibc-debuginfo-2.17-106.el7_2.4.ppc64le.rpm glibc-debuginfo-common-2.17-106.el7_2.4.ppc64le.rpm glibc-devel-2.17-106.el7_2.4.ppc64le.rpm glibc-headers-2.17-106.el7_2.4.ppc64le.rpm glibc-utils-2.17-106.el7_2.4.ppc64le.rpm nscd-2.17-106.el7_2.4.ppc64le.rpm s390x: glibc-2.17-106.el7_2.4.s390.rpm glibc-2.17-106.el7_2.4.s390x.rpm glibc-common-2.17-106.el7_2.4.s390x.rpm glibc-debuginfo-2.17-106.el7_2.4.s390.rpm glibc-debuginfo-2.17-106.el7_2.4.s390x.rpm glibc-debuginfo-common-2.17-106.el7_2.4.s390.rpm glibc-debuginfo-common-2.17-106.el7_2.4.s390x.rpm glibc-devel-2.17-106.el7_2.4.s390.rpm glibc-devel-2.17-106.el7_2.4.s390x.rpm glibc-headers-2.17-106.el7_2.4.s390x.rpm glibc-utils-2.17-106.el7_2.4.s390x.rpm nscd-2.17-106.el7_2.4.s390x.rpm x86_64: glibc-2.17-106.el7_2.4.i686.rpm glibc-2.17-106.el7_2.4.x86_64.rpm glibc-common-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-devel-2.17-106.el7_2.4.i686.rpm glibc-devel-2.17-106.el7_2.4.x86_64.rpm glibc-headers-2.17-106.el7_2.4.x86_64.rpm glibc-utils-2.17-106.el7_2.4.x86_64.rpm nscd-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: glibc-debuginfo-2.17-106.el7_2.4.ppc.rpm glibc-debuginfo-2.17-106.el7_2.4.ppc64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.ppc.rpm glibc-debuginfo-common-2.17-106.el7_2.4.ppc64.rpm glibc-static-2.17-106.el7_2.4.ppc.rpm glibc-static-2.17-106.el7_2.4.ppc64.rpm ppc64le: glibc-debuginfo-2.17-106.el7_2.4.ppc64le.rpm glibc-debuginfo-common-2.17-106.el7_2.4.ppc64le.rpm glibc-static-2.17-106.el7_2.4.ppc64le.rpm s390x: glibc-debuginfo-2.17-106.el7_2.4.s390.rpm glibc-debuginfo-2.17-106.el7_2.4.s390x.rpm glibc-debuginfo-common-2.17-106.el7_2.4.s390.rpm glibc-debuginfo-common-2.17-106.el7_2.4.s390x.rpm glibc-static-2.17-106.el7_2.4.s390.rpm glibc-static-2.17-106.el7_2.4.s390x.rpm x86_64: glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-static-2.17-106.el7_2.4.i686.rpm glibc-static-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: glibc-2.17-106.el7_2.4.src.rpm x86_64: glibc-2.17-106.el7_2.4.i686.rpm glibc-2.17-106.el7_2.4.x86_64.rpm glibc-common-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-devel-2.17-106.el7_2.4.i686.rpm glibc-devel-2.17-106.el7_2.4.x86_64.rpm glibc-headers-2.17-106.el7_2.4.x86_64.rpm glibc-utils-2.17-106.el7_2.4.x86_64.rpm nscd-2.17-106.el7_2.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: glibc-debuginfo-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-2.17-106.el7_2.4.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.4.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.4.x86_64.rpm glibc-static-2.17-106.el7_2.4.i686.rpm glibc-static-2.17-106.el7_2.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-5229 https://access.redhat.com/security/cve/CVE-2015-7547 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/articles/2161461 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFWw0iDXlSAg2UNWIIRAh1MAJ4i9uRE0pNTb+BjMHGTLL5PpEbF6gCgrBwA pR+M8a0yt5CoWGJfxcd7yVg= =gySF -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/glibc-2.17-i486-11_slack14.1.txz: Rebuilt. However, due to a patch applied to Slackware's glibc back in 2009 (don't use the gethostbyname4() lookup method as it was causing some cheap routers to misbehave), we were not vulnerable to that issue. Nevertheless it seems prudent to patch the overflows anyway even if we're not currently using the code in question. Thanks to mancha for the backported patch. patches/packages/glibc-profile-2.17-i486-11_slack14.1.txz: Rebuilt. patches/packages/glibc-solibs-2.17-i486-11_slack14.1.txz: Rebuilt. +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated packages for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/glibc-2.17-i486-11_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/glibc-i18n-2.17-i486-11_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/glibc-profile-2.17-i486-11_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/glibc-solibs-2.17-i486-11_slack14.1.txz Updated packages for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/glibc-2.17-x86_64-11_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/glibc-i18n-2.17-x86_64-11_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/glibc-profile-2.17-x86_64-11_slack14.1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/glibc-solibs-2.17-x86_64-11_slack14.1.txz Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/glibc-solibs-2.23-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/glibc-2.23-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/glibc-i18n-2.23-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/glibc-profile-2.23-i586-1.txz Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/glibc-solibs-2.23-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/glibc-2.23-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/glibc-i18n-2.23-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/glibc-profile-2.23-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.1 packages: 4c56432d638adc8098661cfa818b5bc9 glibc-2.17-i486-11_slack14.1.txz 5c316d6b0a8970fe15fbdf2adff8de19 glibc-i18n-2.17-i486-11_slack14.1.txz a937d842e5ca3d0b125230c23285f8f4 glibc-profile-2.17-i486-11_slack14.1.txz 442f01d094d350612c1fb1fcb5e7fbe7 glibc-solibs-2.17-i486-11_slack14.1.txz Slackware x86_64 14.1 packages: eec88d584a79909ec79aae1c43c330d3 glibc-2.17-x86_64-11_slack14.1.txz d8b396eb6ada65d1555e3cf0fb8246c2 glibc-i18n-2.17-x86_64-11_slack14.1.txz e7deaabfe3e467cbde10ba5b7748bbbb glibc-profile-2.17-x86_64-11_slack14.1.txz 629c93f0e510d354ff66e61f1ebe8b67 glibc-solibs-2.17-x86_64-11_slack14.1.txz Slackware -current packages: b11873e4f851a600b57a2e7a2ac8f472 a/glibc-solibs-2.23-i586-1.txz 5116eec63fab5e7dbc58d27fecd48684 l/glibc-2.23-i586-1.txz ae9b8a8e4ead59aa398212d6893d7ddc l/glibc-i18n-2.23-i586-1.txz 61154e43ee4c0739dd5d3c4ce3b60ae6 l/glibc-profile-2.23-i586-1.txz Slackware x86_64 -current packages: c48a55c8a39dc8e17e04796e4f160bd0 a/glibc-solibs-2.23-x86_64-1.txz 36104e1a004b0e97d193c2132f18222d l/glibc-2.23-x86_64-1.txz e0415f66d17323c8f6df339cfd49051b l/glibc-i18n-2.23-x86_64-1.txz f5433793e9da696a60f2445559f1d33f l/glibc-profile-2.23-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the packages as root: # upgradepkg glibc-*.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. SEC Consult Vulnerability Lab Security Advisory < 20210901-0 > ======================================================================= title: Multiple vulnerabilities product: see "Vulnerable / tested versions" vulnerable version: see "Vulnerable / tested versions" fixed version: see "Solution" CVE number: CVE-2021-39278, CVE-2021-39279 impact: High homepage: https://www.moxa.com/ found: 2020-08-31 by: T. Weber (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult, an Atos company Europe | Asia | North America https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "Together, We Create Change Moxa is committed to making a positive impact around the world. We put our all behind this commitment--from our employees, to our products and supply chain. In our local communities, we nurture and support the spirit of volunteering. We encourage our employees to contribute to community development, with an emphasis on ecology, education, and health. In our products, we invest in social awareness programs and environment-friendly policies at every stage of the product lifecycle. We make sure our manufacturing meets the highest standards with regards to quality, ethics, and sustainability." Source: https://www.moxa.com/en/about-us/corporate-responsibility Business recommendation: ------------------------ SEC Consult recommends to immediately apply the available patches from the vendor. A thorough security review should be performed by security professionals to identify further potential security issues. Vulnerability overview/description: ----------------------------------- 1) Authenticated Command Injection (CVE-2021-39279) An authenticated command injection vulnerability can be triggered by issuing a GET request to the "/forms/web_importTFTP" CGI program which is available on the web interface. An attacker can abuse this vulnerability to compromise the operating system of the device. This issue was found by emulating the firmware of the device. 2) Reflected Cross-Site Scripting via Manipulated Config-File (CVE-2021-39278) Via a crafted config-file, a reflected cross-site scripting vulnerability can be exploited in the context of the victim's browser. This config-file can be uploaded to the device via the "Config Import Export" tab in the main menu. 3) Known GNU glibc Vulnerabilities (CVE-2015-0235) The used GNU glibc in version 2.9 is outdated and contains multiple known vulnerabilities. One of the discovered vulnerabilities (CVE-2015-0235, gethostbyname "GHOST" buffer overflow) was verified by using the MEDUSA scalable firmware runtime. 4) Multiple Outdated Software Components Multiple outdated software components containing vulnerabilities were found by the IoT Inspector. The vulnerabilities 1), 2) and 3) were manually verified on an emulated device by using the MEDUSA scalable firmware runtime. Proof of concept: ----------------- 1) Authenticated Command Injection (CVE-2021-39279) The vulnerability can be triggered by navigating in the web interface to the tab: "Main Menu"->"Maintenance"->"Config Import Export" The "TFTP Import" menu is prone to command injection via all parameters. To exploit the vulnerability, an IP address, a configuration path and a filename must be set. If the filename is used to trigger the exploit, the payload in the interceptor proxy would be: http://192.168.1.1/forms/web_importTFTP?servIP=192.168.1.1&configPath=/&fileName=name|`ping localhost -c 100` 2) Reflected Cross-Site Scripting via Manipulated Config-File (CVE-2021-39278) The vulnerability can be triggered by navigating in the web interface to the tab: "Main Menu"->"Maintenance"->"Config Import Export" The "Config Import" menu is prone to reflected cross-site scripting via the upload of config files. Example of malicious config file: ------------------------------------------------------------------------------- [board] deviceName="WAC-2004_0000</span><script>alert(document.cookie)</script>" deviceLocation="" [..] ------------------------------------------------------------------------------- Uploading such a crafted file triggers cross-site scripting as the erroneous value is displayed without filtering characters. 3) Known GNU glibc Vulnerabilities (CVE-2015-0235) GNU glibc version 2.9 contains multiple CVEs like: CVE-2016-1234, CVE-2015-7547, CVE-2013-7423, CVE-2013-1914, and more. The gethostbyname buffer overflow vulnerability (GHOST) was checked with the help of the exploit code from https://seclists.org/oss-sec/2015/q1/274. It was compiled and executed on the emulated device to test the system. 4) Multiple Outdated Software Components The IoT Inspector recognized multiple outdated software components with known vulnerabilities: BusyBox 1.18.5 06/2011 Dropbear SSH 2011.54 11/2011 GNU glibc 2.9 02/2009 Linux Kernel 2.6.27 10/2008 OpenSSL 0.9.7g 04/2005 Only found in the program "iw_director" OpenSSL 1.0.0 03/2010 Vulnerable / tested versions: ----------------------------- The following firmware versions for various devices have been identified to be vulnerable: * WAC-2004 / 1.7 * WAC-1001 / 2.1 * WAC-1001-T / 2.1 * OnCell G3470A-LTE-EU / 1.7 * OnCell G3470A-LTE-EU-T / 1.7 * TAP-323-EU-CT-T / 1.3 * TAP-323-US-CT-T / 1.3 * TAP-323-JP-CT-T / 1.3 * WDR-3124A-EU / 2.3 * WDR-3124A-EU-T / 2.3 * WDR-3124A-US / 2.3 * WDR-3124A-US-T / 2.3 Vendor contact timeline: ------------------------ 2020-10-09: Contacting vendor through moxa.csrt@moxa.com. 2020-10-12: Contact sends PGP key for encrypted communication and asks for the detailed advisory. Sent encrypted advisory to vendor. 2020-11-06: Status update from vendor regarding technical analysis. Vendor requested more time for fixing the vulnerabilities as more products are affected. 2020-11-09: Granted more time for fixing to vendor. 2020-11-10: Vendor asked for next steps regarding the advisory publication. 2020-11-11: Asked vendor for an estimation when a public disclosure is possible. 2020-11-16: Vendor responded that the product team can give a rough feedback. 2020-11-25: Asked for a status update. 2020-11-25: Vendor responded that the investigation is not done yet. 2020-12-14: Vendor provided a list of potential affected devices and stated that full investigation may take until January 2021 due to the list of CVEs that were provided with the appended IoT Inspector report. The patches may be available until June 2021. 2020-12-15: Shifted next status update round with vendor on May 2021. 2020-12-23: Vendor provided full list of affected devices. 2021-02-05: Vendor sieved out the found issues from 4) manually and provided a full list of confirmed vulnerabilities. WAC-2004 phased-out in 2019. 2021-02-21: Confirmed receive of vulnerabilities, next status update in May 2021. 2021-06-10: Asking for an update. 2021-06-15: Vendor stated, that the update will be provided in the next days. 2021-06-21: Vendor will give an update in the next week as Covid gets worse in Taiwan. 2021-06-23: Vendor stated, that patches are under development. Vendor needs more time to finish the patches. 2021-06-24: Set release date to 2021-09-01. 2021-07-02: Vendor provides status updates. 2021-08-16: Vendor provides status updates. 2021-08-17: Vendor asks for CVE IDs and stated, that WDR-3124A has phased-out. 2021-08-20: Sent assigned CVE-IDs to vendor. Asked for fixed version numbers. 2021-08-31: Vendor provides fixed firmware version numbers and the advisory links. 2021-09-01: Coordinated release of security advisory. Solution: --------- According to the vendor the following patches must be applied to fix issues: * WAC-1001 / 2.1.5 * WAC-1001-T / 2.1.5 * OnCell G3470A-LTE-EU / 1.7.4 * OnCell G3470A-LTE-EU-T / 1.7.4 * TAP-323-EU-CT-T / 1.8.1 * TAP-323-US-CT-T / 1.8.1 * TAP-323-JP-CT-T / 1.8.1 The Moxa Technical Support must be contacted for requesting the security patches. The corresponding security advisories for the affected devices are available on the vendor's website: TAP-323/WAC-1001/WAC-2004 https://www.moxa.com/en/support/product-support/security-advisory/tap-323-wac-1001-2004-wireless-ap-bridge-client-vulnerabilities OnCell G3470A-LTE/WDR-3124A https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3470a-wdr-3124a-cellular-gateways-router-vulnerabilities The following device models are EOL and should be replaced: * WAC-2004 * WDR-3124A-EU * WDR-3124A-EU-T * WDR-3124A-US * WDR-3124A-US-T Workaround: ----------- None. Advisory URL: ------------- https://sec-consult.com/vulnerability-lab/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Vulnerability Lab SEC Consult, an Atos company Europe | Asia | North America About SEC Consult Vulnerability Lab The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an Atos company. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://sec-consult.com/career/ Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://sec-consult.com/contact/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF Thomas Weber / @2021

Trust: 3.15

sources: NVD: CVE-2015-7547 // CERT/CC: VU#457759 // CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // VULMON: CVE-2015-7547 // PACKETSTORM: 137351 // PACKETSTORM: 137497 // PACKETSTORM: 135856 // PACKETSTORM: 135790 // PACKETSTORM: 135911 // PACKETSTORM: 137292 // PACKETSTORM: 136988 // PACKETSTORM: 135971 // PACKETSTORM: 164014

AFFECTED PRODUCTS

vendor:susemodel:linux enterprise serverscope:eqversion:12

Trust: 2.0

vendor:gnumodel:glibcscope:eqversion:2.11.1

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.21

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.14.1

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.16

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.18

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.22

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.11

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.19

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.20

Trust: 1.6

vendor:gnumodel:glibcscope:eqversion:2.10.1

Trust: 1.6

vendor:sophosmodel:unified threat management softwarescope:eqversion:9.355

Trust: 1.0

vendor:susemodel:linux enterprise debuginfoscope:eqversion:11.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:15.10

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc node eusscope:eqversion:7.2

Trust: 1.0

vendor:hpmodel:helion openstackscope:eqversion:2.1.0

Trust: 1.0

vendor:hpmodel:helion openstackscope:eqversion:2.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.11.3

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:eqversion:12.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.17

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:12

Trust: 1.0

vendor:f5model:big-ip analyticsscope:eqversion:12.0.0

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:13.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:eqversion:12.0.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.12.1

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:eqversion:12.0.0

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:eqversion:12.0.0

Trust: 1.0

vendor:oraclemodel:exalogic infrastructurescope:eqversion:1.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.9

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:7.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.10

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.11.2

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.15

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.2

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.12

Trust: 1.0

vendor:hpmodel:helion openstackscope:eqversion:1.1.1

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:eqversion:12.0.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.14

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.12.2

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:sophosmodel:unified threat management softwarescope:eqversion:9.319

Trust: 1.0

vendor:f5model:big-ip link controllerscope:eqversion:12.0.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.2

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:11.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:eqversion:12.0.0

Trust: 1.0

vendor:susemodel:linux enterprise desktopscope:eqversion:11.0

Trust: 1.0

vendor:oraclemodel:exalogic infrastructurescope:eqversion:2.0

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:eqversion:12.0.0

Trust: 1.0

vendor:susemodel:linux enterprise software development kitscope:eqversion:12

Trust: 1.0

vendor:oraclemodel:fujitsu m10scope:lteversion:2290

Trust: 1.0

vendor:gnumodel:glibcscope:eqversion:2.13

Trust: 1.0

vendor:susemodel:linux enterprise serverscope:eqversion:11.0

Trust: 1.0

vendor:hpmodel:server migration packscope:eqversion:7.5

Trust: 1.0

vendor:android open sourcemodel: - scope: - version: -

Trust: 0.8

vendor:aristamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:centosmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnu glibcmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntumodel: - scope: - version: -

Trust: 0.8

vendor:gnumodel:glibcscope:gtversion:2.9

Trust: 0.6

vendor:siemensmodel:apescope: - version: -

Trust: 0.6

vendor:siemensmodel:basic rtscope:eqversion:v13

Trust: 0.6

vendor:siemensmodel:rox ii osscope:gteversion:v2.3.0<=v2.9.0

Trust: 0.6

vendor:siemensmodel:scalance m-800 s615scope:eqversion:/

Trust: 0.6

vendor:siemensmodel:sinema remote connectscope:ltversion:v1.2

Trust: 0.6

sources: CERT/CC: VU#457759 // CNVD: CNVD-2016-01100 // CNNVD: CNNVD-201602-348 // NVD: CVE-2015-7547

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7547
value: HIGH

Trust: 1.0

NVD: CVE-2015-7547
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01100
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201602-348
value: HIGH

Trust: 0.6

VULHUB: VHN-85508
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-7547
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7547
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2015-7547
severity: HIGH
baseScore: 10.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2016-01100
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:M/AU:N/C:C/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-85508
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-7547
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.2
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CERT/CC: VU#457759 // CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // VULMON: CVE-2015-7547 // CNNVD: CNNVD-201602-348 // NVD: CVE-2015-7547

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-85508 // NVD: CVE-2015-7547

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 135856 // PACKETSTORM: 135790 // PACKETSTORM: 137292 // CNNVD: CNNVD-201602-348

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201602-348

EXPLOIT AVAILABILITY

sources: CERT/CC: VU#457759 // VULHUB: VHN-85508 // VULMON: CVE-2015-7547

PATCH

title:Patch for GNU glibc getaddrinfo () stack buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/71529

Trust: 0.6

title:glibc Fixes for stack-based buffer overflow vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=60267

Trust: 0.6

title:Ubuntu Security Notice: eglibc, glibc vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2900-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2016-653url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2016-653

Trust: 0.1

title:Red Hat: CVE-2015-7547url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2015-7547

Trust: 0.1

title:Debian CVElist Bug Report Logs: glibc: CVE-2015-8779: Unbounded stack allocation in catopen functionurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=16e2189e7f81b4f7d63c7959583232bc

Trust: 0.1

title:Debian CVElist Bug Report Logs: glibc: CVE-2015-8778: Integer overflow in hcreate and hcreate_rurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=1428a5cf0fc83abe17c341fcd27e2766

Trust: 0.1

title:Debian CVElist Bug Report Logs: glibc: CVE-2015-8776: Segmentation fault caused by passing out-of-range data to strftime()url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=a4cedca52bffe216d9dc7f5b71bf7997

Trust: 0.1

title:Debian Security Advisories: DSA-3481-1 glibc -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=46354da5a969f7a19a3b640e907393ce

Trust: 0.1

title:Symantec Security Advisories: SA114 : GNU C Library (glibc) Remote Code Execution February 2016url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=3784d7edb4026ac7619e0fa56875339c

Trust: 0.1

title:Tenable Security Advisories: [R3] Tenable Appliance Affected by GNU C Library (glibc) Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2016-05

Trust: 0.1

title:Citrix Security Bulletins: CVE-2015-7547 - Citrix Security Advisory for glibc Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=79323944487cb63a2d4b19d76db61131

Trust: 0.1

title:Forcepoint Security Advisories: CVE-2015-7547 GNU C Library (glibc) Security Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories&qid=c4d92b4bf686ae9b4b4fb48a6b6dc5c1

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=122319027ae43d6d626710f1b1bb1d43

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=8ad80411af3e936eb2998df70506cc71

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:CVE-2015-7547url:https://github.com/cakuzo/CVE-2015-7547

Trust: 0.1

title:CVE-2015-7547url:https://github.com/t0r0t0r0/CVE-2015-7547

Trust: 0.1

sources: CNVD: CNVD-2016-01100 // VULMON: CVE-2015-7547 // CNNVD: CNNVD-201602-348

EXTERNAL IDS

db:NVDid:CVE-2015-7547

Trust: 4.1

db:CERT/CCid:VU#457759

Trust: 2.5

db:BIDid:83265

Trust: 2.3

db:PACKETSTORMid:164014

Trust: 1.8

db:EXPLOIT-DBid:39454

Trust: 1.7

db:EXPLOIT-DBid:40339

Trust: 1.7

db:MCAFEEid:SB10150

Trust: 1.7

db:PACKETSTORMid:167552

Trust: 1.7

db:PACKETSTORMid:135802

Trust: 1.7

db:PACKETSTORMid:154361

Trust: 1.7

db:SECTRACKid:1035020

Trust: 1.7

db:PULSESECUREid:SA40161

Trust: 1.7

db:TENABLEid:TRA-2017-08

Trust: 1.7

db:ICS CERTid:ICSA-16-103-01

Trust: 1.7

db:CNNVDid:CNNVD-201602-348

Trust: 0.7

db:SIEMENSid:SSA-301706

Trust: 0.6

db:CNVDid:CNVD-2016-01100

Trust: 0.6

db:CXSECURITYid:WLB-2022060049

Trust: 0.6

db:AUSCERTid:ESB-2020.2340

Trust: 0.6

db:PACKETSTORMid:135971

Trust: 0.2

db:PACKETSTORMid:137497

Trust: 0.2

db:PACKETSTORMid:135856

Trust: 0.2

db:PACKETSTORMid:136988

Trust: 0.2

db:PACKETSTORMid:135911

Trust: 0.2

db:PACKETSTORMid:137351

Trust: 0.2

db:PACKETSTORMid:136808

Trust: 0.1

db:PACKETSTORMid:135791

Trust: 0.1

db:PACKETSTORMid:138068

Trust: 0.1

db:PACKETSTORMid:136976

Trust: 0.1

db:PACKETSTORMid:136881

Trust: 0.1

db:PACKETSTORMid:135853

Trust: 0.1

db:PACKETSTORMid:137112

Trust: 0.1

db:PACKETSTORMid:136325

Trust: 0.1

db:PACKETSTORMid:135801

Trust: 0.1

db:PACKETSTORMid:136985

Trust: 0.1

db:PACKETSTORMid:135800

Trust: 0.1

db:PACKETSTORMid:135789

Trust: 0.1

db:PACKETSTORMid:138601

Trust: 0.1

db:PACKETSTORMid:136048

Trust: 0.1

db:SEEBUGid:SSVID-90749

Trust: 0.1

db:VULHUBid:VHN-85508

Trust: 0.1

db:VULMONid:CVE-2015-7547

Trust: 0.1

db:PACKETSTORMid:135790

Trust: 0.1

db:PACKETSTORMid:137292

Trust: 0.1

sources: CERT/CC: VU#457759 // CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // VULMON: CVE-2015-7547 // PACKETSTORM: 137351 // PACKETSTORM: 137497 // PACKETSTORM: 135856 // PACKETSTORM: 135790 // PACKETSTORM: 135911 // PACKETSTORM: 137292 // PACKETSTORM: 136988 // PACKETSTORM: 135971 // PACKETSTORM: 164014 // CNNVD: CNNVD-201602-348 // NVD: CVE-2015-7547

REFERENCES

url:https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html

Trust: 3.9

url:https://sourceware.org/bugzilla/show_bug.cgi?id=18665

Trust: 2.5

url:https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Trust: 2.5

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17

Trust: 2.5

url:https://bto.bluecoat.com/security-advisory/sa114

Trust: 2.5

url:http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow

Trust: 2.5

url:http://packetstormsecurity.com/files/154361/cisco-device-hardcoded-credentials-gnu-glibc-busybox.html

Trust: 2.3

url:http://packetstormsecurity.com/files/164014/moxa-command-injection-cross-site-scripting-vulnerable-software.html

Trust: 2.3

url:http://packetstormsecurity.com/files/167552/nexans-ftto-gigaswitch-outdated-components-hardcoded-backdoor.html

Trust: 2.3

url:https://access.redhat.com/articles/2161461

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2016-0176.html

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2016-0277.html

Trust: 1.8

url:http://www.securitytracker.com/id/1035020

Trust: 1.7

url:http://seclists.org/fulldisclosure/2019/sep/7

Trust: 1.7

url:https://seclists.org/bugtraq/2019/sep/7

Trust: 1.7

url:http://seclists.org/fulldisclosure/2021/sep/0

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/jun/36

Trust: 1.7

url:https://www.exploit-db.com/exploits/39454/

Trust: 1.7

url:https://www.exploit-db.com/exploits/40339/

Trust: 1.7

url:http://www.securityfocus.com/bid/83265

Trust: 1.7

url:http://www.debian.org/security/2016/dsa-3480

Trust: 1.7

url:http://www.debian.org/security/2016/dsa-3481

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2016-february/177404.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2016-february/177412.html

Trust: 1.7

url:https://security.gentoo.org/glsa/201602-02

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-0175.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2016-0225.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html

Trust: 1.7

url:http://ubuntu.com/usn/usn-2900-1

Trust: 1.7

url:https://www.kb.cert.org/vuls/id/457759

Trust: 1.7

url:http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow

Trust: 1.7

url:http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-stack-based-buffer-overflow.html

Trust: 1.7

url:http://support.citrix.com/article/ctx206991

Trust: 1.7

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html

Trust: 1.7

url:http://www.vmware.com/security/advisories/vmsa-2016-0002.html

Trust: 1.7

url:https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/

Trust: 1.7

url:https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=1293532

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05028479

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04989404

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05008367

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05053211

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05073516

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05098877

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05125672

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05128937

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05130958

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05140858

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05158380

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05176716

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05212266

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05376917

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.7

url:https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes

Trust: 1.7

url:https://ics-cert.us-cert.gov/advisories/icsa-16-103-01

Trust: 1.7

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40161

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20160217-0002/

Trust: 1.7

url:https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html

Trust: 1.7

url:https://support.lenovo.com/us/en/product_security/len_5450

Trust: 1.7

url:https://www.tenable.com/security/research/tra-2017-08

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html

Trust: 1.7

url:https://access.redhat.com/security/cve/cve-2015-7547

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145672440608228&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145596041017029&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145857691004892&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=146161017210491&w=2

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=145690841819314&w=2

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10150

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2015-7547

Trust: 0.9

url:https://sourceware.org/glibc/wiki/glibc%20timeline

Trust: 0.8

url:https://www.centos.org/forums/viewtopic.php?t=56467

Trust: 0.8

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160218-glibc

Trust: 0.8

url:https://lists.debian.org/debian-lts-announce/2016/02/msg00009.html

Trust: 0.8

url:http://www.ubuntu.com/usn/usn-2900-1/

Trust: 0.8

url:http://forums.juniper.net/t5/security-incident-response/glibc-getaddrinfo-stack-based-buffer-overflow-cve-2015-7547/ba-p/288261

Trust: 0.8

url:http://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-301706.pdf

Trust: 0.6

url:https://googleonlinesecurity.blogspot.de/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html

Trust: 0.6

url:https://isc.sans.edu/diary/cve-2015-7547

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2016:0225

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2016:0277

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2016:0176

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2016:0175

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160304-01-glibc-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2340/

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022060049

Trust: 0.6

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n

Trust: 0.5

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.5

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2016-0705

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-0728

Trust: 0.2

url:http://marc.info/?l=bugtraq&amp;m=145690841819314&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145596041017029&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145672440608228&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=145857691004892&amp;w=2

Trust: 0.1

url:http://marc.info/?l=bugtraq&amp;m=146161017210491&amp;w=2

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10150

Trust: 0.1

url:https://helion.hpwsportal.com

Trust: 0.1

url:http://docs.hpcloud.com/#helion/installation/upgrade20_to_202.html

Trust: 0.1

url:http://docs.hpcloud.com/#helion/releasenotes202.html

Trust: 0.1

url:http://docs.hpcloud.com/#helion/installation/upgrade20_to_212.html

Trust: 0.1

url:http://docs.hpcloud.com/#helion/installation/upgrade_to_212.html

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnu

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5229

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-5229

Trust: 0.1

url:http://slackware.com

Trust: 0.1

url:http://osuosl.org)

Trust: 0.1

url:http://slackware.com/gpg-key

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7547

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-6750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1792

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3195

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0799

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3237

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3513

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2015

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7501

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2017

Trust: 0.1

url:https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05111017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4969

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05131044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-6565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3568

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3508

Trust: 0.1

url:http://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05130958

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3509

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3511

Trust: 0.1

url:http://www.hpe.com/info/insightcontrol

Trust: 0.1

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39278

Trust: 0.1

url:https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3470a-wdr-3124a-cellular-gateways-router-vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0235

Trust: 0.1

url:https://www.moxa.com/en/about-us/corporate-responsibility

Trust: 0.1

url:https://seclists.org/oss-sec/2015/q1/274.

Trust: 0.1

url:https://sec-consult.com/contact/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-7423

Trust: 0.1

url:https://www.sec-consult.com

Trust: 0.1

url:https://sec-consult.com/vulnerability-lab/

Trust: 0.1

url:https://twitter.com/sec_consult

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1234

Trust: 0.1

url:https://www.moxa.com/en/support/product-support/security-advisory/tap-323-wac-1001-2004-wireless-ap-bridge-client-vulnerabilities

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-39279

Trust: 0.1

url:http://blog.sec-consult.com

Trust: 0.1

url:https://www.moxa.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1914

Trust: 0.1

url:https://sec-consult.com/career/

Trust: 0.1

url:http://192.168.1.1/forms/web_importtftp?servip=192.168.1.1&configpath=/&filename=name|`ping

Trust: 0.1

sources: CERT/CC: VU#457759 // CNVD: CNVD-2016-01100 // VULHUB: VHN-85508 // PACKETSTORM: 137351 // PACKETSTORM: 137497 // PACKETSTORM: 135856 // PACKETSTORM: 135790 // PACKETSTORM: 135911 // PACKETSTORM: 137292 // PACKETSTORM: 136988 // PACKETSTORM: 135971 // PACKETSTORM: 164014 // CNNVD: CNNVD-201602-348 // NVD: CVE-2015-7547

CREDITS

T. Weber

Trust: 0.7

sources: PACKETSTORM: 164014 // CNNVD: CNNVD-201602-348

SOURCES

db:CERT/CCid:VU#457759
db:CNVDid:CNVD-2016-01100
db:VULHUBid:VHN-85508
db:VULMONid:CVE-2015-7547
db:PACKETSTORMid:137351
db:PACKETSTORMid:137497
db:PACKETSTORMid:135856
db:PACKETSTORMid:135790
db:PACKETSTORMid:135911
db:PACKETSTORMid:137292
db:PACKETSTORMid:136988
db:PACKETSTORMid:135971
db:PACKETSTORMid:164014
db:CNNVDid:CNNVD-201602-348
db:NVDid:CVE-2015-7547

LAST UPDATE DATE

2025-08-12T22:12:01.306000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#457759date:2016-03-14T00:00:00
db:CNVDid:CNVD-2016-01100date:2016-07-12T00:00:00
db:VULHUBid:VHN-85508date:2023-02-12T00:00:00
db:VULMONid:CVE-2015-7547date:2023-02-12T00:00:00
db:CNNVDid:CNNVD-201602-348date:2023-04-06T00:00:00
db:NVDid:CVE-2015-7547date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#457759date:2016-02-17T00:00:00
db:CNVDid:CNVD-2016-01100date:2016-02-18T00:00:00
db:VULHUBid:VHN-85508date:2016-02-18T00:00:00
db:VULMONid:CVE-2015-7547date:2016-02-18T00:00:00
db:PACKETSTORMid:137351date:2016-06-08T13:13:00
db:PACKETSTORMid:137497date:2016-06-16T15:13:17
db:PACKETSTORMid:135856date:2016-02-19T23:33:00
db:PACKETSTORMid:135790date:2016-02-16T17:17:45
db:PACKETSTORMid:135911date:2016-02-24T23:59:59
db:PACKETSTORMid:137292date:2016-06-02T19:12:12
db:PACKETSTORMid:136988date:2016-05-13T16:14:06
db:PACKETSTORMid:135971date:2016-02-26T19:32:00
db:PACKETSTORMid:164014date:2021-09-01T15:42:52
db:CNNVDid:CNNVD-201602-348date:2016-02-18T00:00:00
db:NVDid:CVE-2015-7547date:2016-02-18T21:59:00.120