Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9445

Опубликовано: 28 июн. 2017
Источник: debian
EPSS Низкий

Описание

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed233-10package
systemdfixed232-25+deb9u1stretchpackage
systemdnot-affectedjessiepackage
systemdnot-affectedwheezypackage

Примечания

  • Introduced by: https://github.com/systemd/systemd/commit/a0166609f782da91710dea9183d1bf138538db37

  • https://www.openwall.com/lists/oss-security/2017/06/27/8

EPSS

Процентиль: 89%
0.04426
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
redhat
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
nvd
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

suse-cvrf
больше 8 лет назад

Security update for systemd, dracut

CVSS3: 7.5
github
больше 3 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

EPSS

Процентиль: 89%
0.04426
Низкий