PT-2017-2373 · Linux +3 · Systemd +3

Chris Coulson

·

Published

2017-06-27

·

Updated

2024-06-15

·

CVE-2017-9445

CVSS v2.0
9.3
VectorAV:N/AC:M/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions:

systemd versions through 233

Description:

The issue is caused by a buffer overflow in the dns packet new function of the systemd-resolved service in the Linux operating system. This can be exploited by a remote attacker who creates a malicious DNS server that sends a response with specially crafted data of a large size, allowing the attacker to crash the system-resolved service and potentially execute arbitrary code.

Recommendations:

For versions through 233, consider disabling the dns packet new function as a temporary workaround until a patch is available. Restrict access to the system-resolved service to minimize the risk of exploitation. Avoid using the system-resolved service until the issue is resolved.

Fix

Memory Corruption

Buffer Overflow

Weakness Enumeration

Related Identifiers

ALT-PU-2017-1893
BDU:2017-01575
CVE-2017-9445
OPENSUSE-SU-2024:11420-1
SUSE-SU-2017:1898-1
SUSE-SU-2017:2031-1
SUSE-SU-2017_1898-1
USN-3341-1

Affected Products

Alt Linux
Suse
Ubuntu
Systemd