In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
systemd project systemd 228 |
||
systemd project systemd 229 |
||
systemd project systemd 226 |
||
systemd project systemd 227 |
||
systemd project systemd 234 |
||
systemd project systemd 235 |
||
systemd project systemd 223 |
||
systemd project systemd 224 |
||
systemd project systemd 225 |
||
systemd project systemd 232 |
||
systemd project systemd 233 |
||
systemd project systemd 230 |
||
systemd project systemd 231 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 16.04 |