On February 16, 2016, an industry-wide, critical vulnerability in the GNU C library (glibc) was publicly disclosed.

Multiple Cisco products incorporate a version of glibc that may be affected by the vulnerability.

The vulnerability could allow an unauthenticated, remote attacker to trigger a buffer overflow condition that may result in a denial of service (DoS) condition or allow the attacker to execute arbitrary code on an affected device.

Cisco will release software updates that address this vulnerability.

Workarounds that address this vulnerability are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-glibc
On February 16, 2016, an industry-wide, critical vulnerability in the GNU C library (glibc) was publicly disclosed.

Multiple Cisco products incorporate a version of glibc that may be affected by the vulnerability.

The vulnerability could allow an unauthenticated, remote attacker to trigger a buffer overflow condition that may result in a denial of service (DoS) condition or allow the attacker to execute arbitrary code on an affected device.

Cisco will release software updates that address this vulnerability.

Workarounds that address this vulnerability are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160218-glibc

Security Impact Rating: High

CVE: CVE-2015-7547