Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-14339

Опубликовано: 20 сент. 2017
Источник: debian
EPSS Низкий

Описание

The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
yadifafixed2.2.6-1package

Примечания

  • https://www.tarlogic.com/blog/fuzzing-yadifa-dns/

  • https://github.com/yadifa/yadifa/blob/v2.2.6/ChangeLog

EPSS

Процентиль: 74%
0.0083
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive.

CVSS3: 7.5
nvd
больше 8 лет назад

The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive.

CVSS3: 7.5
github
больше 3 лет назад

The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive.

EPSS

Процентиль: 74%
0.0083
Низкий