(Palo Alto Networks Issues Fix for Palo Alto PAN-OS) Glibc getaddrinfo() Stack Overflow Lets Remote or Local Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1036671 |
SecurityTracker URL: http://securitytracker.com/id/1036671
|
CVE Reference:
CVE-2015-7547
(Links to External Site)
|
Date: Aug 19 2016
|
Impact:
Execution of arbitrary code via local system, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 5.0.X, 5.1.X, 6.0.X, 6.1.12 and prior, 7.0.7 and prior, 7.1.3 and prior
|
Description:
A vulnerability was reported in Glibc. A remote or local user can execute arbitrary code on the target system. Palo Alto PAN-OS is affected.
A remote or local user can send specially crafted data to trigger a stack overflow in the getaddrinfo() function in the glibc DNS client resolver code ('resolv/nss_dns') and execute arbitrary code on the target system. The code will run with the privileges of the target application using the glibc library.
Various applications may be affected, including ssh, sudo, and curl.
Additional information is available at:
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
|
Impact:
A remote or local user can execute arbitrary code on the target system.
|
Solution:
Palo Alto Networks has issued a fix for Palo Alto PAN-OS (6.1.13, 7.0.8, 7.1.4).
The Palo Alto Networks advisory is available at:
https://securityadvisories.paloaltonetworks.com/Home/Detail/54
|
Vendor URL: securityadvisories.paloaltonetworks.com/Home/Detail/54 (Links to External Site)
|
Cause:
Boundary error
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|