Generated remediation guidance and an executive summary. No account required.
In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
Cite this page
CVE-2017-9445. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2017-9445
Use CWE-787, Systemd Project vendor hub and Systemd product page to widen CVE-2017-9445 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-40224, CVE-2026-40226 and CVE-2026-40225 for nearby disclosures in the same product family.