CVE-2017-5685 This issue can be triggered by a user attempting to lookup a host name with a large number of subdomains. It is likely that the authoritative server is configured to return a large number of data records during a lookup. As a result, the authoritative server will have a large number of data records to process. When an authoritative server is configured to return a large number of records, it can cause the authoritative server to consume a large amount of CPU. If a remote attacker is able to pass large numbers of queries to an authoritative server, it can cause the authoritative server to consume a large amount of CPU. NOTE: This issue exists because of an incorrect fix for CVE-2015-1814. As a result, it is likely that a large number of systems are still vulnerable to this issue.

CVE-2017-5624

CVE-2019-1807 This issue can be triggered by a user attempting to lookup a host name with a large number of subdomains. It is likely that the authoritative server is configured to return a large number of data records during a lookup. As a result, the authoritative server will have a large number of data records to process. When an authoritative server is configured to return a large number of records, it can cause the authoritative server to consume a large amount of CPU. If an attacker is able to pass large numbers of queries to an authoritative server, it can cause the authoritative server to consume a large amount of CPU. NOTE: This issue exists because of an incorrect fix for CVE-2015-1427. As a result, it is likely that some systems are still vulnerable to this issue.

CVE-2017-5683

CVE-2017-5685 This issue can be triggered by an application that calls the getaddrinfo function and passes a large number of arguments to it. The function will then use the socket API to attempt to resolve the host name into an IP address, which can cause a large number of system calls and subsequently consume a large amount of CPU. NOTE: This issue exists because of an incorrect fix for CVE-2015-1814. As a result, it is likely that a large number of systems are still vulnerable to this issue.

Vulnerable Packages

-CentOS 6.9
-Debian 7 Unstable
-Fedora 25
-Gentoo Linux 8.2
-Red Hat Enterprise Linux 7.4
-SUSE Linux Enterprise Server 11 SP3

The following packages have been uploaded to the Centos and Debian repositories to address this issue:

Description of Trend Micro Smart Scanner

Trend Micro Smart Scanner is a scanner with "behavioral intelligent technologies" that scans for vulnerabilities in your network. It's designed to help you prevent and detect attacks on your systems, and it uses "advanced machine learning technologies" to identify unknown threats.

Description of the Vulnerability

A vulnerability in the QNAP QTS 4.3.7-9 and 4.3.7-10 could allow remote attackers to consume a large amount of CPU resource with a crafted IP address or host name.
In order to exploit this vulnerability, an attacker would need to send a crafted query that includes a malformed IP address or host name to an affected system and convince the victim of the system to process the malformed query. The processing of this query can cause an affected system to consume a large amount of CPU resources due to its size, which can result in a Denial-of-Service (DoS) condition for other users on the same network as well as for systems in other networks that have established network connectivity with the vulnerable QNAP server.

Timeline

Published on: 09/23/2022 16:15:00 UTC
Last modified on: 09/27/2022 23:15:00 UTC

References