HomeSystemd ProjectCVE-2017-9445

CVE-2017-9445

HIGH
7.5CVSS
Published: 2017-06-28
Updated: 2025-04-20
AI Analysis

Description

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-787

Metadata

Primary Vendor
SYSTEMD_PROJECT
Published
6/28/2017
Last Modified
4/20/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

systemd_project : systemd

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2017-9445 | HIGH Severity | CVEDatabase.com | CVEDatabase.com