5
CVSSv2

CVE-2017-9445

Published: 28/06/2017 Updated: 31/01/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemd project systemd

Vendor Advisories

Debian Bug report logs - #866147 systemd: CVE-2017-9445: Out-of-bounds write in systemd-resolved with crafted TCP payload Package: src:systemd; Maintainer for src:systemd is Debian systemd Maintainers <pkg-systemd-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 27 ...
systemd-resolved could be made to crash or run programs if it received a specially crafted DNS response ...
An out-of-bounds write flaw was found in the way systemd-resolved daemon handled processing of DNS responses A remote attacker could potentially use this flaw to crash the daemon or execute arbitrary code in the context of the daemon process ...
An out-of-bounds write was discovered in systemd-resolved when handling specially crafted DNS responses A remote attacker could potentially exploit this to cause a denial of service (daemon crash) or execute arbitrary code ...

Recent Articles

Don't panic, but Linux's Systemd can be pwned via an evil DNS query
The Register • Shaun Nichols in San Francisco • 29 Jun 2017

PS, Alpine users, you need to get patching, too – for other reasons

Systemd, the Linux world's favorite init monolith, can be potentially crashed or hijacked by malicious DNS servers. Patches are available to address the security flaw, and should be installed ASAP if you're affected. Looking up a hostname from a vulnerable Systemd-powered PC, handheld, gizmo or server can be enough to trigger an attack by an evil DNS service: the software's resolved component can be fooled into allocating too little memory for a lookup response, and when a large reply is eventua...