The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-4001 | |
https://github.com/yadifa/yadifa/blob/v2.2.6/ChangeLog | Third Party Advisory |
https://www.tarlogic.com/blog/fuzzing-yadifa-dns/ | Exploit Technical Description Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-09-20T16:00:00
Updated: 2017-11-03T18:57:01
Reserved: 2017-09-12T00:00:00
Link: CVE-2017-14339
JSON object: View
NVD Information
Status : Modified
Published: 2017-09-20T16:29:00.817
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-14339
JSON object: View
Redhat Information
No data.
CWE