Lucene search

K
Systemd ProjectSystemd

6 matches found

CVE
CVE
added 2017/10/26 2:29 p.m.192 views

CVE-2017-15908

In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.

7.5CVSS7.3AI score0.00353EPSS
CVE
CVE
added 2017/07/07 5:29 p.m.83 views

CVE-2017-1000082

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

10CVSS7.6AI score0.00557EPSS
CVE
CVE
added 2017/06/28 6:29 a.m.83 views

CVE-2017-9445

In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and...

7.5CVSS7.5AI score0.04706EPSS
CVE
CVE
added 2017/09/25 9:29 p.m.69 views

CVE-2015-7510

Stack-based buffer overflow in the getpwnam and getgrnam functions of the NSS module nss-mymachines in systemd.

9.8CVSS8.8AI score0.00452EPSS
CVE
CVE
added 2017/05/24 5:29 a.m.65 views

CVE-2017-9217

systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.

7.5CVSS7AI score0.0149EPSS
CVE
CVE
added 2017/01/23 7:59 a.m.64 views

CVE-2016-10156

A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.

7.8CVSS7.4AI score0.00805EPSS