In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2017/06/27/8 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/99302 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038806 | Third Party Advisory VDB Entry |
https://launchpad.net/bugs/1695546 | Broken Link |
http://openwall.com/lists/oss-security/2017/06/27/8 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/99302 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038806 | Third Party Advisory VDB Entry |
https://launchpad.net/bugs/1695546 | Broken Link |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2017/06/27/8 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/99302 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038806 - Third Party Advisory, VDB Entry | |
References | () https://launchpad.net/bugs/1695546 - Broken Link |
Information
Published : 2017-06-28 06:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9445
Mitre link : CVE-2017-9445
CVE.ORG link : CVE-2017-9445
JSON object : View
Products Affected
systemd_project
- systemd
CWE
CWE-787
Out-of-bounds Write