PT-2017-2373 · Linux +3 · Systemd +3
Chris Coulson
·
Published
2017-06-27
·
Updated
2024-06-15
·
CVE-2017-9445
9.3
High
Base vector | Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
systemd versions through 233
Description:
The issue is caused by a buffer overflow in the dns packet new function of the systemd-resolved service in the Linux operating system. This can be exploited by a remote attacker who creates a malicious DNS server that sends a response with specially crafted data of a large size, allowing the attacker to crash the system-resolved service and potentially execute arbitrary code.
Recommendations:
For versions through 233, consider disabling the dns packet new function as a temporary workaround until a patch is available. Restrict access to the system-resolved service to minimize the risk of exploitation. Avoid using the system-resolved service until the issue is resolved.
Fix
Memory Corruption
Buffer Overflow
Related Identifiers
Affected Products
References · 68
- https://osv.dev/vulnerability/SUSE-SU-2017:2031-1 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2017-9445 · Vendor Advisory
- https://osv.dev/vulnerability/openSUSE-SU-2024:11420-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000082 · Security Note
- https://bdu.fstec.ru/vul/2017-02107 · Security Note
- https://ubuntu.com/security/notices/USN-3341-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9217 · Security Note
- https://bdu.fstec.ru/vul/2019-01640 · Security Note
- https://osv.dev/vulnerability/UBUNTU-CVE-2017-9445 · Vendor Advisory
- https://cve.org/CVERecord?id=CVE-2017-9445 · Security Note
- https://osv.dev/vulnerability/SUSE-SU-2017:1898-1 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445 · Security Note
- https://bdu.fstec.ru/vul/2017-01575 · Security Note
- https://osv.dev/vulnerability/CVE-2017-9445 · Vendor Advisory