Lucene search

K
prionPRIOn knowledge basePRION:CVE-2017-9445
HistoryJun 28, 2017 - 6:29 a.m.

Code injection

2017-06-2806:29:00
PRIOn knowledge base
www.prio-n.com
2

7 High

AI Score

Confidence

Low

0.528 Medium

EPSS

Percentile

97.6%

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that’s too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that’s too small, and subsequently write arbitrary data beyond the end of it.

CPENameOperatorVersion
systemdge223
systemdle233