Description
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1039662
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/101600
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/systemd/systemd/pull/7184
Patch, Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3558-1/
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351
Scores
CVSS v3
7.5
EPSS
0.0027
EPSS Percentile
50.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-835
Status
published
Products (15)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
systemd_project/systemd
223
systemd_project/systemd
224
systemd_project/systemd
225
systemd_project/systemd
226
systemd_project/systemd
227
systemd_project/systemd
228
systemd_project/systemd
229
systemd_project/systemd
230
... and 5 more
Published
Oct 26, 2017
Tracked Since
Feb 18, 2026