CVE-2017-15908

HIGH

Systemd - Infinite Loop

Title source: rule
STIX 2.1

Description

In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1039662
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/101600
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/systemd/systemd/pull/7184
Patch, Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3558-1/
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1725351

Scores

CVSS v3 7.5
EPSS 0.0027
EPSS Percentile 50.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-835
Status published
Products (15)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
systemd_project/systemd 223
systemd_project/systemd 224
systemd_project/systemd 225
systemd_project/systemd 226
systemd_project/systemd 227
systemd_project/systemd 228
systemd_project/systemd 229
systemd_project/systemd 230
... and 5 more
Published Oct 26, 2017
Tracked Since Feb 18, 2026