Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/97321 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2017:1285 | vendor advisory |
https://github.com/collectd/collectd/issues/2174 | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:2615 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:1787 | vendor advisory |