CVE Vulnerabilities

CVE-2017-7401

Loop with Unreachable Exit Condition ('Infinite Loop')

Published: Apr 03, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with SecurityLevel None and with empty AuthFile options) via a crafted UDP packet.

Weakness

The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

Affected Software

NameVendorStart VersionEnd Version
CollectdCollectd*5.7.1 (including)
Red Hat Gluster Storage 3.4 for RHEL 7RedHatcollectd-0:5.7.2-3.1.el7rhgs*
Red Hat OpenStack Platform 11.0 Operational Tools for RHEL 7RedHatcollectd-0:5.7.2-1.1.el7ost*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatcollectd-0:5.7.1-4.el7*
Red Hat Virtualization Engine 4.1RedHatcollectd-0:5.7.1-4.el7*
CollectdUbuntuartful*
CollectdUbuntuesm-apps/xenial*
CollectdUbuntuesm-infra-legacy/trusty*
CollectdUbuntuprecise*
CollectdUbuntutrusty*
CollectdUbuntutrusty/esm*
CollectdUbuntuupstream*
CollectdUbuntuxenial*
CollectdUbuntuyakkety*
CollectdUbuntuzesty*

References