CVE-2017-15908 PUBLISHED

In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.

EPSS 0.27% · 50.0th percentile

Risk Scores

EPSS Score
0.27%
50.0th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSsystemd0, 225-1ubuntu9, 227-2ubuntu1
Cloudflaredns

Timeline

References

Open in Interactive Console →