Логотип exploitDog
bind:CVE-2017-9445
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-9445

Количество 8

Количество 8

ubuntu логотип

CVE-2017-9445

больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2017-9445

больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2017-9445

больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2017-9445

больше 8 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in syst ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:1898-1

больше 8 лет назад

Security update for systemd, dracut

EPSS: Низкий
github логотип

GHSA-42xm-66qf-5jj8

больше 3 лет назад

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2017-01575

больше 8 лет назад

Уязвимость функции dns_packet_new системного сервиса system-resolved менеджера Systemmd операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS2: 9.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2031-1

больше 8 лет назад

Security update for systemd

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-9445

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
4%
Низкий
больше 8 лет назад
redhat логотип
CVE-2017-9445

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
4%
Низкий
больше 8 лет назад
nvd логотип
CVE-2017-9445

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
4%
Низкий
больше 8 лет назад
debian логотип
CVE-2017-9445

In systemd through 233, certain sizes passed to dns_packet_new in syst ...

CVSS3: 7.5
4%
Низкий
больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:1898-1

Security update for systemd, dracut

4%
Низкий
больше 8 лет назад
github логотип
GHSA-42xm-66qf-5jj8

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS3: 7.5
4%
Низкий
больше 3 лет назад
fstec логотип
BDU:2017-01575

Уязвимость функции dns_packet_new системного сервиса system-resolved менеджера Systemmd операционной системы Linux, позволяющая нарушителю выполнить произвольный код

CVSS2: 9.3
4%
Низкий
больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:2031-1

Security update for systemd

больше 8 лет назад

Уязвимостей на страницу