In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
                
            References
                    | Link | Resource | 
|---|---|
| http://openwall.com/lists/oss-security/2017/06/27/8 | Mailing List Patch Third Party Advisory | 
| http://www.securityfocus.com/bid/99302 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1038806 | Third Party Advisory VDB Entry | 
| https://launchpad.net/bugs/1695546 | Broken Link | 
| http://openwall.com/lists/oss-security/2017/06/27/8 | Mailing List Patch Third Party Advisory | 
| http://www.securityfocus.com/bid/99302 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1038806 | Third Party Advisory VDB Entry | 
| https://launchpad.net/bugs/1695546 | Broken Link | 
Configurations
                    History
                    21 Nov 2024, 03:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://openwall.com/lists/oss-security/2017/06/27/8 - Mailing List, Patch, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/99302 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1038806 - Third Party Advisory, VDB Entry | |
| References | () https://launchpad.net/bugs/1695546 - Broken Link | 
Information
                Published : 2017-06-28 06:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-9445
Mitre link : CVE-2017-9445
CVE.ORG link : CVE-2017-9445
JSON object : View
Products Affected
                systemd_project
- systemd
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
