2024-12-08 03:06:42 +00:00

139 lines
3.9 KiB
JSON

{
"id": "CVE-2017-14339",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-09-20T16:29:00.817",
"lastModified": "2024-11-21T03:12:35.893",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The DNS packet parser in YADIFA before 2.2.6 does not check for the presence of infinite pointer loops, and thus it is possible to force it to enter an infinite loop. This can cause high CPU usage and makes the server unresponsive."
},
{
"lang": "es",
"value": "El analizador sint\u00e1ctico de paquetes DNS en YADIFA en versiones anteriores a la 2.2.6 no comprueba la presencia de bucles de puntero infinitos, por lo que es posible forzarlo a entrar en un bucle infinito. Esto puede provocar un gran uso de recursos de CPU y hacer que el servidor no responda."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"baseScore": 7.8,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yadifa:yadifa:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.5",
"matchCriteriaId": "E76A9995-CE82-476B-B061-E19D0D7E59ED"
}
]
}
]
}
],
"references": [
{
"url": "http://www.debian.org/security/2017/dsa-4001",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/yadifa/yadifa/blob/v2.2.6/ChangeLog",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.tarlogic.com/blog/fuzzing-yadifa-dns/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2017/dsa-4001",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/yadifa/yadifa/blob/v2.2.6/ChangeLog",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.tarlogic.com/blog/fuzzing-yadifa-dns/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}