{"id":"UBUNTU-CVE-2017-15908","details":"In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.","modified":"2026-02-04T02:47:57.513703Z","published":"2017-10-26T00:00:00Z","related":["USN-3466-1","USN-3558-1"],"upstream":["CVE-2017-15908"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15908"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3466-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3558-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-15908"}],"affected":[{"package":{"name":"systemd","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/systemd@229-4ubuntu21.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"229-4ubuntu21.1"}]}],"versions":["225-1ubuntu9","227-2ubuntu1","227-2ubuntu2","228-1ubuntu2","228-2ubuntu1","228-2ubuntu2","228-3ubuntu1","228-4ubuntu1","228-4ubuntu2","228-5ubuntu1","228-5ubuntu2","228-5ubuntu3","228-6ubuntu1","229-1ubuntu2","229-1ubuntu4","229-2ubuntu1","229-3ubuntu1","229-3ubuntu2","229-4ubuntu1","229-4ubuntu4","229-4ubuntu5","229-4ubuntu6","229-4ubuntu7","229-4ubuntu8","229-4ubuntu10","229-4ubuntu11","229-4ubuntu12","229-4ubuntu13","229-4ubuntu16","229-4ubuntu17","229-4ubuntu19","229-4ubuntu20","229-4ubuntu21"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"229-4ubuntu21.1","binary_name":"libnss-myhostname"},{"binary_version":"229-4ubuntu21.1","binary_name":"libnss-mymachines"},{"binary_version":"229-4ubuntu21.1","binary_name":"libnss-resolve"},{"binary_version":"229-4ubuntu21.1","binary_name":"libpam-systemd"},{"binary_version":"229-4ubuntu21.1","binary_name":"libsystemd-dev"},{"binary_version":"229-4ubuntu21.1","binary_name":"libsystemd0"},{"binary_version":"229-4ubuntu21.1","binary_name":"libudev-dev"},{"binary_version":"229-4ubuntu21.1","binary_name":"libudev1"},{"binary_version":"229-4ubuntu21.1","binary_name":"systemd"},{"binary_version":"229-4ubuntu21.1","binary_name":"systemd-container"},{"binary_version":"229-4ubuntu21.1","binary_name":"systemd-coredump"},{"binary_version":"229-4ubuntu21.1","binary_name":"systemd-journal-remote"},{"binary_version":"229-4ubuntu21.1","binary_name":"systemd-sysv"},{"binary_version":"229-4ubuntu21.1","binary_name":"udev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-15908.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}