Dear Teneo Customer,
Palo Alto Networks has released this emergency content update to add coverage for the glibc getaddrinfo stack-based buffer overflow vulnerability, CVE-2015-7547. Customers are advised to upgrade all devices to the latest version of Content Apps and Threats and review policies to ensure desired actions are configured on all security policies. For more information about the glibc vulnerability, please view the following sites here:
https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
https://isc.sans.edu/forums/diary/CVE20157547 Critical Vulnerability in glibc getaddrinfo/20737
Modified Decoders (1)
Name: dns
New Vulnerability Signatures (1)
Severity ID Attack Name CVE ID Vendor ID Default Action Minimum PAN-OS Version
critical 38898 Glibc getaddrinfo Buffer Overflow Vulnerability CVE-2015-7547 alert 4.1.0
Disabled Vulnerability Signatures (1)
Severity ID Attack Name CVE ID Vendor ID Default Action Minimum PAN-OS Version
critical 38714 Exploit Kit Related Injected Javascripts Detection reset-both 4.1.0
What if I need help?
If you have any questions regarding this notification please don’t hesitate to reach out to us, or visit our support portal.
You can contact us on our 24 x 7 support number or mail us support@teneo.net
EMEA: +44 (0)845 299 0623
US: +1 877 836 3610
APAC: +61 1800 765 389
Thanks
Teneo Support
Comments
0 comments
Article is closed for comments.