systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/98677 | Third Party Advisory VDB Entry |
| https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | Issue Tracking Patch Third Party Advisory |
| https://github.com/systemd/systemd/pull/5998 | Issue Tracking Patch Third Party Advisory |
| https://launchpad.net/bugs/1621396 | Issue Tracking Third Party Advisory |
| http://www.securityfocus.com/bid/98677 | Third Party Advisory VDB Entry |
| https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be | Issue Tracking Patch Third Party Advisory |
| https://github.com/systemd/systemd/pull/5998 | Issue Tracking Patch Third Party Advisory |
| https://launchpad.net/bugs/1621396 | Issue Tracking Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20241213-0003/ |
Configurations
History
13 Dec 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2017-05-24 05:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9217
Mitre link : CVE-2017-9217
CVE.ORG link : CVE-2017-9217
JSON object : View
Products Affected
systemd_project
- systemd
CWE
CWE-476
NULL Pointer Dereference
