First published: Thu Apr 06 2017(Updated: )
Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet. Upstream bug: <a href="https://github.com/collectd/collectd/issues/2174">https://github.com/collectd/collectd/issues/2174</a>
Affected Software | Affected Version | How to fix |
---|---|---|
collectd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1439674 is categorized as a denial of service vulnerability.
To fix REDHAT-BUG-1439674, configure collectd with a valid 'AuthFile' and avoid using 'SecurityLevel None'.
REDHAT-BUG-1439674 affects collectd instances configured with 'SecurityLevel None' and empty 'AuthFile' options.
Yes, REDHAT-BUG-1439674 can be exploited remotely via crafted UDP packets.
The impact of REDHAT-BUG-1439674 is an infinite loop that causes a denial of service in collectd.