PT-2017-2373 · Linux+3 · Systemd+3
Chris Coulson
·
Published
2017-06-27
·
Updated
2024-06-15
·
CVE-2017-9445
CVSS v2.0
9.3
High
| AV:N/AC:M/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
systemd versions through 233
Description
The issue is caused by a buffer overflow in the dns packet new function of the systemd-resolved service in the Linux operating system. This can be exploited by a remote attacker who creates a malicious DNS server that sends a response with specially crafted data of a large size, allowing the attacker to crash the system-resolved service and potentially execute arbitrary code.
Recommendations
For versions through 233, consider disabling the dns packet new function as a temporary workaround until a patch is available. Restrict access to the system-resolved service to minimize the risk of exploitation. Avoid using the system-resolved service until the issue is resolved.
Fix
Buffer Overflow
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Alt Linux
Suse
Ubuntu
Systemd