vulnerability

SUSE: CVE-2017-9445: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jun 28, 2017
Added
Jul 19, 2017
Modified
Feb 4, 2022

Description

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

Solution(s)

suse-upgrade-dracutsuse-upgrade-dracut-fipssuse-upgrade-libsystemd0suse-upgrade-libsystemd0-32bitsuse-upgrade-libudev-develsuse-upgrade-libudev1suse-upgrade-libudev1-32bitsuse-upgrade-sles12sp2-docker-imagesuse-upgrade-systemdsuse-upgrade-systemd-32bitsuse-upgrade-systemd-bash-completionsuse-upgrade-systemd-containersuse-upgrade-systemd-coredumpsuse-upgrade-systemd-develsuse-upgrade-systemd-docsuse-upgrade-systemd-journal-remotesuse-upgrade-systemd-langsuse-upgrade-systemd-sysvinitsuse-upgrade-udev
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.