Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-7547 PoC — GNU C Library 缓冲区错误漏洞

Source
Associated Vulnerability
Title:GNU C Library 缓冲区错误漏洞 (CVE-2015-7547)
Description:Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Readme
# CVE-2015-7547
https://github.com/fjserna/CVE-2015-7547<br>
で<br>
CentOS6でいろいろ落ちるかやってみた。<br>
<br>
<br>

    ./CVE-2015-7547-poc.py &
    vi /etc/resolve.conf
    ---------------------------------------------------------------
    options single-request-reopen
    #nameserver 8.8.8.8
    nameserver 127.0.0.1
    ---------------------------------------------------------------

PHPの関数は↓で<br>

    ./dns-get.php


iptables<br>
でのQTYPE別長さチェックDROPできたけどうーん。。。TCPでは長さチェックできないので普通に事故る。なのでTCPはsportで落とすほうがよかと。<br>

File Snapshot

[4.0K] /data/pocs/62bd87ddf012d6ff87a1f6fea7b697f0f8017306 ├── [2.5K] cmd.md ├── [ 565] dns-get.php ├── [1009] iptables └── [ 665] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →