CVE-2015-7547
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
CVE, Inc., Red Hat
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
CVE, Inc., Red Hat
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
CVE, Inc., Red Hat
Third Party Advisory
http://marc.info/?l=bugtraq&m=145596041017029&w=2
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=145672440608228&w=2
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=145690841819314&w=2
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=145857691004892&w=2
CVE, Inc., Red Hat
http://marc.info/?l=bugtraq&m=146161017210491&w=2
CVE, Inc., Red Hat
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
CVE, Inc., Red Hat
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
CVE, Inc., Red Hat
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
CVE, Inc., Red Hat
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
CVE, Inc., Red Hat
http://rhn.redhat.com/errata/RHSA-2016-0175.html
CVE, Inc., Red Hat
http://rhn.redhat.com/errata/RHSA-2016-0176.html
CVE, Inc., Red Hat
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0225.html
CVE, Inc., Red Hat
http://rhn.redhat.com/errata/RHSA-2016-0277.html
CVE, Inc., Red Hat
http://seclists.org/fulldisclosure/2019/Sep/7
CVE, Inc., Red Hat
http://seclists.org/fulldisclosure/2021/Sep/0
CVE, Inc., Red Hat
http://seclists.org/fulldisclosure/2022/Jun/36
CVE, Inc., Red Hat
http://support.citrix.com/article/CTX206991
CVE, Inc., Red Hat
http://ubuntu.com/usn/usn-2900-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.debian.org/security/2016/dsa-3480
CVE, Inc., Red Hat
http://www.debian.org/security/2016/dsa-3481
CVE, Inc., Red Hat
Third Party Advisory
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
CVE, Inc., Red Hat
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
CVE, Inc., Red Hat
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/83265
CVE, Inc., Red Hat
http://www.securitytracker.com/id/1035020
CVE, Inc., Red Hat
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
CVE, Inc., Red Hat
https://access.redhat.com/articles/2161461
CVE, Inc., Red Hat
Third Party Advisory
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
CVE, Inc., Red Hat
Third Party Advisory
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
CVE, Inc., Red Hat
Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa114
CVE, Inc., Red Hat
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1293532
CVE, Inc., Red Hat
Issue Tracking
Third Party Advisory
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
CVE, Inc., Red Hat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
CVE, Inc., Red Hat
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
CVE, Inc., Red Hat
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
CVE, Inc., Red Hat
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
CVE, Inc., Red Hat
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10150
CVE, Inc., Red Hat
Third Party Advisory
https://seclists.org/bugtraq/2019/Sep/7
CVE, Inc., Red Hat
https://security.gentoo.org/glsa/201602-02
CVE, Inc., Red Hat
Third Party Advisory
https://security.netapp.com/advisory/ntap-20160217-0002/
CVE, Inc., Red Hat
https://sourceware.org/bugzilla/show_bug.cgi?id=18665
CVE, Inc., Red Hat
Issue Tracking
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
CVE, Inc., Red Hat
Mailing List
Vendor Advisory
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
CVE, Inc., Red Hat
Third Party Advisory
https://support.lenovo.com/us/en/product_security/len_5450
CVE, Inc., Red Hat
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
CVE, Inc., Red Hat
https://www.exploit-db.com/exploits/39454/
CVE, Inc., Red Hat
https://www.exploit-db.com/exploits/40339/
CVE, Inc., Red Hat
https://www.kb.cert.org/vuls/id/457759
CVE, Inc., Red Hat
https://www.tenable.com/security/research/tra-2017-08
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
NIST  
Change History
48 change records found show changes
CVE Modified by CVE 11/20/2024 9:36:57 PM
Action
Type
Old Value
New Value
Added
Reference
http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
Added
Reference
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
Added
Reference
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
Added
Reference
http://marc.info/?l=bugtraq&m=145596041017029&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=145672440608228&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=145690841819314&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=145857691004892&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=146161017210491&w=2
Added
Reference
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
Added
Reference
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
Added
Reference
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
Added
Reference
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0175.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0176.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0225.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0277.html
Added
Reference
http://seclists.org/fulldisclosure/2019/Sep/7
Added
Reference
http://seclists.org/fulldisclosure/2021/Sep/0
Added
Reference
http://seclists.org/fulldisclosure/2022/Jun/36
Added
Reference
http://support.citrix.com/article/CTX206991
Added
Reference
http://ubuntu.com/usn/usn-2900-1
Added
Reference
http://www.debian.org/security/2016/dsa-3480
Added
Reference
http://www.debian.org/security/2016/dsa-3481
Added
Reference
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
Added
Reference
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
Added
Reference
http://www.securityfocus.com/bid/83265
Added
Reference
http://www.securitytracker.com/id/1035020
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2016-0002.html
Added
Reference
https://access.redhat.com/articles/2161461
Added
Reference
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
Added
Reference
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
Added
Reference
https://bto.bluecoat.com/security-advisory/sa114
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=1293532
Added
Reference
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Added
Reference
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Added
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
Added
Reference
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10150
Added
Reference
https://seclists.org/bugtraq/2019/Sep/7
Added
Reference
https://security.gentoo.org/glsa/201602-02
Added
Reference
https://security.netapp.com/advisory/ntap-20160217-0002/
Added
Reference
https://sourceware.org/bugzilla/show_bug.cgi?id=18665
Added
Reference
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html
Added
Reference
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
Added
Reference
https://support.lenovo.com/us/en/product_security/len_5450
Added
Reference
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
Added
Reference
https://www.exploit-db.com/exploits/39454/
Added
Reference
https://www.exploit-db.com/exploits/40339/
Added
Reference
https://www.kb.cert.org/vuls/id/457759
Added
Reference
https://www.tenable.com/security/research/tra-2017-08
CVE Modified by Red Hat, Inc. 5/13/2024 11:42:01 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 2/12/2023 6:15:36 PM
Action
Type
Old Value
New Value
Changed
Description
A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Removed
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Removed
Reference
https://access.redhat.com/errata/RHSA-2016:0175 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2016:0176 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2016:0225 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2016:0277 [No Types Assigned]
Removed
Reference
https://access.redhat.com/security/cve/CVE-2015-7547 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/02/2023 4:16:00 PM
Action
Type
Old Value
New Value
Changed
Description
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.
Added
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Added
Reference
https://access.redhat.com/errata/RHSA-2016:0175 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2016:0176 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2016:0225 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2016:0277 [No Types Assigned]
Added
Reference
https://access.redhat.com/security/cve/CVE-2015-7547 [No Types Assigned]
CVE Modified by Red Hat, Inc. 6/20/2022 3:15:08 PM
Action
Type
Old Value
New Value
Added
Reference
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 6/17/2022 3:15:08 PM
Action
Type
Old Value
New Value
Added
Reference
http://seclists.org/fulldisclosure/2022/Jun/36 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/25/2022 9:15:08 AM
Action
Type
Old Value
New Value
Added
Reference
https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17 [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/01/2021 2:15:08 PM
Action
Type
Old Value
New Value
Added
Reference
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/01/2021 9:15:08 AM
Action
Type
Old Value
New Value
Added
Reference
http://seclists.org/fulldisclosure/2021/Sep/0 [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/04/2019 10:15:11 PM
Action
Type
Old Value
New Value
Added
Reference
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/04/2019 8:15:11 PM
Action
Type
Old Value
New Value
Added
Reference
https://seclists.org/bugtraq/2019/Sep/7 [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/04/2019 7:15:11 PM
Action
Type
Old Value
New Value
Added
Reference
http://seclists.org/fulldisclosure/2019/Sep/7 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/30/2018 4:31:24 PM
Action
Type
Old Value
New Value
Added
Reference
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes [No Types Assigned]
CPE Deprecation Remap by NIST 10/30/2018 12:27:36 PM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
OR
*cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
CPE Deprecation Remap by NIST 10/30/2018 12:27:37 PM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*
OR
*cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 1/18/2018 1:18:02 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/09/2017 9:29:02 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.netapp.com/advisory/ntap-20160217-0002/ [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/02/2017 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.tenable.com/security/research/tra-2017-08 [No Types Assigned]
CVE Modified by Red Hat, Inc. 9/02/2017 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.exploit-db.com/exploits/40339/ [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/16/2017 9:59:04 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/19/2017 9:59:03 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/05/2016 10:03:16 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html [No Types Assigned]
Added
Reference
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html [No Types Assigned]
Added
Reference
http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html [No Types Assigned]
Added
Reference
http://support.citrix.com/article/CTX206991 [No Types Assigned]
Added
Reference
http://www.securitytracker.com/id/1035020 [No Types Assigned]
Added
Reference
http://www.vmware.com/security/advisories/VMSA-2016-0002.html [No Types Assigned]
Added
Reference
https://www.exploit-db.com/exploits/39454/ [No Types Assigned]
Added
Reference
https://www.kb.cert.org/vuls/id/457759 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/02/2016 10:13:00 PM
Action
Type
Old Value
New Value
Added
Reference
http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0175.html [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0225.html [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0277.html [No Types Assigned]
Added
Reference
http://www.debian.org/security/2016/dsa-3480 [No Types Assigned]
Added
Reference
http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow [No Types Assigned]
Added
Reference
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en [No Types Assigned]
Added
Reference
https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01 [No Types Assigned]
Added
Reference
https://support.lenovo.com/us/en/product_security/len_5450 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/30/2016 10:01:15 PM
Action
Type
Old Value
New Value
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 [No Types Assigned]
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 [No Types Assigned]
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 [No Types Assigned]
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 [No Types Assigned]
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 [No Types Assigned]
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/29/2016 10:02:16 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 [No Types Assigned]
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516 [No Types Assigned]
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 [No Types Assigned]
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 [No Types Assigned]
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 [No Types Assigned]
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/28/2016 2:43:31 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/bid/83265 [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/11/2016 10:01:25 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
CVE Modified by Red Hat, Inc. 8/23/2016 9:59:10 PM
Action
Type
Old Value
New Value
Removed
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05028479
CVE Modified by Red Hat, Inc. 8/22/2016 10:10:06 PM
Action
Type
Old Value
New Value
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
Removed
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
CVE Modified by Red Hat, Inc. 8/19/2016 10:01:00 PM
Action
Type
Old Value
New Value
Added
Reference
http://marc.info/?l=bugtraq&m=145596041017029&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=145672440608228&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=145690841819314&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=145857691004892&w=2
Added
Reference
http://marc.info/?l=bugtraq&m=146161017210491&w=2
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
Added
Reference
https://h20565.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05028479
CVE Modified by Red Hat, Inc. 8/16/2016 9:59:47 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
Modified Analysis by NIST 8/05/2016 11:05:28 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Record truncated, showing 2048 of 4715 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
Record truncated, showing 2048 of 4715 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
*cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
Configuration 3
OR
*cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
*cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
Configuration 5
OR
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html Third Party Advisory
Changed
Reference Type
http://rhn.redhat.com/errata/RHSA-2016-0176.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2016-0176.html Third Party Advisory
Changed
Reference Type
http://ubuntu.com/usn/usn-2900-1 No Types Assigned
http://ubuntu.com/usn/usn-2900-1 Third Party Advisory
Changed
Reference Type
http://www.debian.org/security/2016/dsa-3481 No Types Assigned
http://www.debian.org/security/2016/dsa-3481 Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html Patch
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html Third Party Advisory, Patch
Changed
Reference Type
https://access.redhat.com/articles/2161461 No Types Assigned
https://access.redhat.com/articles/2161461 Third Party Advisory
Changed
Reference Type
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ No Types Assigned
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/ Third Party Advisory
Changed
Reference Type
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ No Types Assigned
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/ Third Party Advisory
Changed
Reference Type
https://bto.bluecoat.com/security-advisory/sa114 No Types Assigned
https://bto.bluecoat.com/security-advisory/sa114 Third Party Advisory
Changed
Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1293532 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1293532 Third Party Advisory, Issue Tracking
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858 Third Party Advisory
Changed
Reference Type
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 No Types Assigned
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161 Third Party Advisory
Changed
Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10150 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10150 Third Party Advisory
Changed
Reference Type
https://security.gentoo.org/glsa/201602-02 No Types Assigned
https://security.gentoo.org/glsa/201602-02 Third Party Advisory
Changed
Reference Type
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 No Types Assigned
https://sourceware.org/bugzilla/show_bug.cgi?id=18665 Issue Tracking
Changed
Reference Type
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html Vendor Advisory
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html Mailing List, Vendor Advisory
Changed
Reference Type
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html No Types Assigned
https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html Third Party Advisory
CVE Modified by Red Hat, Inc. 7/27/2016 9:59:16 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
CVE Modified by Red Hat, Inc. 7/22/2016 9:59:01 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html
Modified Analysis by NIST 6/23/2016 1:46:10 PM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Record truncated, showing 2048 of 4443 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.1
Record truncated, showing 2048 of 4715 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*
*cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*
*cpe:2.3:o:novell:opensuse:13.2:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
*cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 6/20/2016 9:59:08 PM
Action
Type
Old Value
New Value
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10150
CVE Modified by Red Hat, Inc. 6/14/2016 10:00:04 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
CVE Modified by Red Hat, Inc. 6/10/2016 10:00:43 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
CVE Modified by Red Hat, Inc. 6/02/2016 10:00:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.gentoo.org/glsa/201602-02
Modified Analysis by NIST 4/26/2016 10:29:36 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Record truncated, showing 2048 of 4443 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
*cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
Configuration 5
OR
*cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:
Record truncated, showing 2048 of 4443 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.1
Modified Analysis by NIST 4/25/2016 10:13:14 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Configuration 1
OR
*cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
Record truncated, showing 2048 of 4443 characters.
View Entire Change Record
Configuration 1
OR
*cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*
*cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*
Configuration 5
OR
*cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html Patch
Changed
Reference Type
https://access.redhat.com/articles/2161461 Advisory
https://access.redhat.com/articles/2161461 No Types Assigned
Changed
Reference Type
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html Advisory
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html No Types Assigned
CVE Modified by Red Hat, Inc. 4/21/2016 9:59:32 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
CVE Modified by Red Hat, Inc. 4/20/2016 9:59:14 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
Added
Reference
http://www.debian.org/security/2016/dsa-3481
CVE Modified by Red Hat, Inc. 4/11/2016 9:59:22 PM
Action
Type
Old Value
New Value
Added
Reference
http://rhn.redhat.com/errata/RHSA-2016-0176.html
Added
Reference
https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
Added
Reference
https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
Added
Reference
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
Modified Analysis by NIST 4/01/2016 2:45:21 PM
Action
Type
Old Value
New Value
Changed
Reference Type
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html Advisory, Patch
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html Advisory
CVE Modified by Red Hat, Inc. 2/24/2016 9:59:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://bto.bluecoat.com/security-advisory/sa114
Modified Analysis by NIST 2/19/2016 11:08:12 AM
Action
Type
Old Value
New Value
Added
CVSS V3
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added
CVSS V2
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Added
CWE
CWE-119
Added
CPE Configuration
Configuration 1
OR
*cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*
*cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*
Changed
Reference Type
https://access.redhat.com/articles/2161461 No Types Assigned
https://access.redhat.com/articles/2161461 Advisory
Changed
Reference Type
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html No Types Assigned
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html Advisory
Changed
Reference Type
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html No Types Assigned
https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html Advisory, Patch
Initial CVE Analysis 2/19/2016 10:51:12 AM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2015-7547 NVD
Published Date: 02/18/2016 NVD
Last Modified: 04/12/2025
Source: Red Hat, Inc.