Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-9107
HistoryJun 18, 2020 - 12:00 a.m.

CVE-2017-9107

2020-06-1800:00:00
ubuntu.com
ubuntu.com
13

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

65.3%

An issue was discovered in adns before 1.5.2. It overruns reading a buffer
if a domain ends with backslash. If the query domain ended with , and
adns_qf_quoteok_query was specified, qdparselabel would read additional
bytes from the buffer and try to treat them as the escape sequence. It
would depart the input buffer and start processing many bytes of arbitrary
heap data as if it were the query domain. Eventually it would run out of
input or find some other kind of error, and declare the query domain
invalid. But before then it might outrun available memory and crash. In
principle this could be a denial of service attack.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchadns< anyUNKNOWN
ubuntu20.04noarchadns< anyUNKNOWN
ubuntu16.04noarchadns< anyUNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

65.3%