Hello Steem community,
I wanted to make sure to inform users of Ubuntu 16.10 and 17.04 to patch their systemd; a remote code exploit has been found that takes advantage of a bug in systemd combined with open port 53 to allow arbitrary code to be executed on your machine.
If you're using Ubuntu 16.04 LTS, your machine should be unaffected as port 53 should be closed by default. You can check by running the following command:
sudo nmap -sU -p 53 MACHINE_IP
Shout out to for providing the command above!
More details can be found on:
CVE-2017-9445: Out-of-bounds write in systemd-resolved with crafted TCP payload.
The guide for patching this vulnerability can be found on Ubuntu's website here.