Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2017-7401: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

SUSE: CVE-2017-7401: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
04/03/2017
Created
02/10/2022
Added
02/04/2022
Modified
02/04/2022

Description

Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet.

Solution(s)

  • suse-upgrade-collectd
  • suse-upgrade-collectd-plugin-connectivity
  • suse-upgrade-collectd-plugin-dbi
  • suse-upgrade-collectd-plugin-ipmi
  • suse-upgrade-collectd-plugin-java
  • suse-upgrade-collectd-plugin-lua
  • suse-upgrade-collectd-plugin-mcelog
  • suse-upgrade-collectd-plugin-memcachec
  • suse-upgrade-collectd-plugin-mysql
  • suse-upgrade-collectd-plugin-notify-desktop
  • suse-upgrade-collectd-plugin-nut
  • suse-upgrade-collectd-plugin-openldap
  • suse-upgrade-collectd-plugin-ovs
  • suse-upgrade-collectd-plugin-pcie
  • suse-upgrade-collectd-plugin-pinba
  • suse-upgrade-collectd-plugin-postgresql
  • suse-upgrade-collectd-plugin-procevent
  • suse-upgrade-collectd-plugin-python3
  • suse-upgrade-collectd-plugin-smart
  • suse-upgrade-collectd-plugin-snmp
  • suse-upgrade-collectd-plugin-synproxy
  • suse-upgrade-collectd-plugin-sysevent
  • suse-upgrade-collectd-plugin-uptime
  • suse-upgrade-collectd-plugin-virt
  • suse-upgrade-collectd-plugin-write_stackdriver
  • suse-upgrade-collectd-plugin-write_syslog
  • suse-upgrade-collectd-plugins-all
  • suse-upgrade-collectd-spamassassin
  • suse-upgrade-collectd-web
  • suse-upgrade-collectd-web-js
  • suse-upgrade-libcollectdclient-devel
  • suse-upgrade-libcollectdclient1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;