Loop with Unreachable Exit Condition ('Infinite Loop')

Affecting systemd package, versions <229-4ubuntu21.1

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.

References

CVSS Score

7.5
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    None
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE
CVE-2017-15908
CWE
CWE-835
Snyk ID
SNYK-UBUNTU1604-SYSTEMD-305077
Disclosed
26 Oct, 2017
Published
26 Oct, 2017