Bug 951787 (CVE-2015-7987) - VUL-0: CVE-2015-7987,CVE-2015-7988: mDNSResponder: Bonjour mDNSResponder vulnerability [VU#143335]
Summary: VUL-0: CVE-2015-7987,CVE-2015-7988: mDNSResponder: Bonjour mDNSResponder vuln...
Status: RESOLVED INVALID
Alias: CVE-2015-7987
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-10-23 15:24 UTC by Andreas Stieger
Modified: 2016-12-12 13:01 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 2 Stanislav Brabec 2015-10-23 18:26:21 UTC
Now we have avahi. It has a completely different API, and the mDNSResponder API is provided as a translation layer.

So the common code base is not large, if any.

I just checked function names mentioned in the report, and there is no match in avahi. (I checked the old version avahi-0.6.25 released 2009.)


Regarding mDNSResponder-lib on SLES 10 SP4 LTSS: It would be good to know, whether the vulnerability could be triggered remotely, using a specially crafted mDNS packet, or just locally.
Comment 3 Swamp Workflow Management 2015-10-23 22:00:35 UTC
bugbot adjusting priority
Comment 6 Andreas Stieger 2015-10-26 10:22:34 UTC
The package mDNSResponder-lib in the legacy SLE 11 family of SUSE Enterprise products derives code from mDNSResponder, but does not contain vulnerable code as advised for these vulnerabilities tracked under VU#1543335.
Comment 8 Andreas Stieger 2015-11-04 08:58:49 UTC
CRD: postponed to moved early 2016
Comment 10 Andreas Stieger 2016-06-16 09:32:33 UTC
CRD: 2016-06-20
Comment 11 Andreas Stieger 2016-12-12 13:01:30 UTC
https://www.kb.cert.org/vuls/id/143335