In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101600 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039662 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351 | Issue Tracking Patch Third Party Advisory |
https://github.com/systemd/systemd/pull/7184 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3558-1/ | Patch Third Party Advisory |
http://www.securityfocus.com/bid/101600 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039662 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351 | Issue Tracking Patch Third Party Advisory |
https://github.com/systemd/systemd/pull/7184 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3558-1/ | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101600 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039662 - Third Party Advisory, VDB Entry | |
References | () https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/systemd/systemd/pull/7184 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3558-1/ - Patch, Third Party Advisory |
20 Feb 2022, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | (UBUNTU) https://usn.ubuntu.com/3558-1/ - Patch, Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
28 Jan 2022, 19:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:freedesktop:systemd:233:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:225:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:229:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:227:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:230:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:231:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:223:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:232:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:226:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:234:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:235:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:228:*:*:*:*:*:*:* |
cpe:2.3:a:systemd_project:systemd:233:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:226:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:232:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:235:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:224:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:227:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:230:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:228:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:231:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:225:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:234:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:223:*:*:*:*:*:*:* |
Information
Published : 2017-10-26 14:29
Updated : 2024-11-21 03:15
NVD link : CVE-2017-15908
Mitre link : CVE-2017-15908
CVE.ORG link : CVE-2017-15908
JSON object : View
Products Affected
systemd_project
- systemd
canonical
- ubuntu_linux
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')