Описание
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | released | 234-2ubuntu12.1 |
| devel | released | 235-2ubuntu3 |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/xenial | released | 229-4ubuntu21.1 |
| precise/esm | DNE | |
| trusty | not-affected | code not present |
| trusty/esm | not-affected | code not present |
| upstream | needs-triage | |
| xenial | released | 229-4ubuntu21.1 |
| zesty | released | 232-21ubuntu7.1 |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
In systemd 223 through 235, a remote DNS server can respond with a cus ...
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3