An out-of-bounds write flaw was found in the way systemd-resolved daemon handled processing of DNS responses. A remote attacker could potentially use this flaw to crash the daemon or execute arbitrary code in the context of the daemon process.
An out-of-bounds write in systemd-resolved due to allocating buffer that is too small in dns_packet_new was found. Malicious DNS server can exploit this by responding with specially crafted TCP payload to write arbitrary data beyond the allocated buffer.
Name: Chris Coulson (Canonical)
Created attachment 1290017 [details]
This issue did not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7.
Created systemd tracking bugs for this issue:
Affects: fedora-all [bug 1465728]