In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://launchpad.net/bugs/1695546 | broken link |
http://www.securitytracker.com/id/1038806 | vdb entry third party advisory |
http://www.securityfocus.com/bid/99302 | vdb entry third party advisory |
http://openwall.com/lists/oss-security/2017/06/27/8 | mailing list third party advisory patch |