[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Arbitrary data write vulnerability in systemd via a response with a specially crafted TCP payload

ID: oval:org.secpod.oval:def:42507Date: (C)2017-10-26   (M)2022-02-01
Class: VULNERABILITYFamily: unix




In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

Platform:
Debian 9.x
Product:
systemd
Reference:
CVE-2017-9445
CVE    1
CVE-2017-9445
CPE    2
cpe:/a:ubuntu_developers:systemd
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies