Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-7547 PoC — GNU C Library 缓冲区错误漏洞

Source
Associated Vulnerability
Title:GNU C Library 缓冲区错误漏洞 (CVE-2015-7547)
Description:Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
Description
 glibc getaddrinfo stack-based buffer overflow
Readme
# CVE-2015-7547
 glibc getaddrinfo stack-based buffer overflow
File Snapshot

[4.0K] /data/pocs/9b4490269b0b95b26a0058bcffa162ba3e404b54 ├── [ 967] CVE-2015-7547-client.c ├── [4.5K] CVE-2015-7547-poc.py ├── [ 11K] LICENSE ├── [ 109] Makefile ├── [ 936] README └── [ 63] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →