Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-7547 PoC — GNU C Library 缓冲区错误漏洞

Source
Associated Vulnerability
Title:GNU C Library 缓冲区错误漏洞 (CVE-2015-7547)
Description:Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Description
glibc check and update in light of CVE-2015-7547
Readme
# rex-ossec-base

## setup()
Will update the glibc files as are required. 

## check()
Will check the glibc packages as they stand. 



```
task "setup", make {

  Rex::Collectd::Base::setup();

};
```

File Snapshot

[4.0K] /data/pocs/303354bf4c6f662d4a52b08f9a5c956f92bc65a5 ├── [ 11K] LICENSE ├── [ 174] meta.yml ├── [ 648] __module__.pm ├── [ 203] README.md └── [ 191] Rexfile.example 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →