In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-26T14:00:00
Updated: 2024-08-05T20:04:50.415Z
Reserved: 2017-10-25T00:00:00
Link: CVE-2017-15908
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-10-26T14:29:00.207
Modified: 2024-11-21T03:15:26.277
Link: CVE-2017-15908
Redhat