First published: Mon Apr 03 2017(Updated: )
Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
collectd | <=5.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7401 is classified as a denial of service vulnerability due to an infinite loop in collectd.
To fix CVE-2017-7401, upgrade collectd to version 5.7.2 or later.
CVE-2017-7401 affects collectd versions 5.7.1 and earlier.
Yes, CVE-2017-7401 can be exploited remotely by attackers if collectd is configured with 'SecurityLevel None' and has empty 'AuthFile' options.
CVE-2017-7401 can cause a denial of service, leading to unresponsive collectd instances.