First published: Thu Oct 26 2017(Updated: )
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | =223 | |
Systemd Project Systemd | =224 | |
Systemd Project Systemd | =225 | |
Systemd Project Systemd | =226 | |
Systemd Project Systemd | =227 | |
Systemd Project Systemd | =228 | |
Systemd Project Systemd | =229 | |
Systemd Project Systemd | =230 | |
Systemd Project Systemd | =231 | |
Systemd Project Systemd | =232 | |
Systemd Project Systemd | =233 | |
Systemd Project Systemd | =234 | |
Systemd Project Systemd | =235 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
debian/systemd | 247.3-7+deb11u5 247.3-7+deb11u6 252.30-1~deb12u2 256.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-15908.
The severity of CVE-2017-15908 is high, with a severity value of 7.5.
CVE-2017-15908 affects systemd versions 223 through 235.
CVE-2017-15908 can be exploited by a remote DNS server sending a specially crafted DNS NSEC resource record.
Yes, there are fixes available for CVE-2017-15908. Please refer to the references for more information.