Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

KB-6307: Is Centrify affected by CVE-2015-7547?

Centrify DirectAudit ,   Centrify DirectControl ,  

12 April,16 at 10:58 AM

Applies to: All versions of Centrify DirectControl and Centrify DirectAudit

Question:

The CVE-2015-7547 is considered to have critical impact as reported in https://packetstormsecurity.com/files/135793/Debian-Security-Advisory-3480-1.html and https://packetstormsecurity.com/files/135791/Red-Hat-Security-Advisory-2016-0225-01.html

Is Centrify DirectContorl or Centrify DirectAudit affected?
Is there a patch can be applied to fix this bug? 

Answer:
 
To summarize, the issue is libc.so that is part of glibc package. Centrify DirectControl / DirectAUdit does not ship libc.so - but use the one on the OS, and ship libgcc.so which is NOT part of glibc.
 
In other words, this is the issue with OS base, NOT CDC / CDA. Once the OS is patched, the new libc.so on the OS will be used. (adclient,dad,curl,dzdo,etc).
 
It is advised to apply the patch from OS vendor as soon as possible to minimize the exposure.
 
Additionally since CDC / CDA does not support IPv6, and thus do not make query for AAAA records, but the CLI like curl does. As a result, it is also recommended to apply the glibc patch from OS vendor as soon as possible.

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.