ID |
CVE-2017-9445
|
Sažetak |
In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it. |
Reference |
|
CVSS |
Base: | 5.0 |
Impact: | 2.9 |
Exploitability: | 10.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
NONE |
PARTIAL |
|
CVSS vektor |
AV:N/AC:L/Au:N/C:N/I:N/A:P |
Zadnje važnije ažuriranje |
31-01-2022 - 18:19 |
Objavljeno |
28-06-2017 - 06:29 |