Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-42xm-66qf-5jj8

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

EPSS

Процентиль: 89%
0.04426
Низкий

7.5 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
redhat
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
nvd
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
debian
больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in syst ...

suse-cvrf
больше 8 лет назад

Security update for systemd, dracut

EPSS

Процентиль: 89%
0.04426
Низкий

7.5 High

CVSS3

Дефекты

CWE-787