In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101600 | VDB Entry Third Party Advisory |
http://www.securitytracker.com/id/1039662 | Third Party Advisory VDB Entry |
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351 | Issue Tracking Patch Third Party Advisory |
https://github.com/systemd/systemd/pull/7184 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3558-1/ | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Feb 2022, 05:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Canonical ubuntu Linux
Canonical |
|
References | (UBUNTU) https://usn.ubuntu.com/3558-1/ - Patch, Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
28 Jan 2022, 19:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Systemd Project
Systemd Project systemd |
|
References | (BID) http://www.securityfocus.com/bid/101600 - VDB Entry, Third Party Advisory | |
CPE | cpe:2.3:a:freedesktop:systemd:224:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:230:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:229:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:227:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:232:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:223:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:228:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:226:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:234:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:235:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:231:*:*:*:*:*:*:* cpe:2.3:a:freedesktop:systemd:233:*:*:*:*:*:*:* |
cpe:2.3:a:systemd_project:systemd:234:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:228:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:235:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:226:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:232:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:233:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:231:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:225:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:224:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:230:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:223:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:227:*:*:*:*:*:*:* cpe:2.3:a:systemd_project:systemd:229:*:*:*:*:*:*:* |
Information
Published : 2017-10-26 14:29
Updated : 2023-12-10 12:15
NVD link : CVE-2017-15908
Mitre link : CVE-2017-15908
CVE.ORG link : CVE-2017-15908
JSON object : View
Products Affected
canonical
- ubuntu_linux
systemd_project
- systemd
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')