[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-25682Date: (C)2021-01-21   (M)2023-12-22


A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.1CVSS Score : 8.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 5.9Impact Score: 8.5
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-4844
FEDORA-2021-2e4c3d5a9d
FEDORA-2021-84440e87ba
GLSA-202101-17
https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html
https://bugzilla.redhat.com/show_bug.cgi?id=1882014
https://www.jsof-tech.com/disclosures/dnspooq/

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/a:thekelleys:dnsmasq
CWE    1
CWE-122
OVAL    18
oval:org.secpod.oval:def:89002836
oval:org.secpod.oval:def:89002787
oval:org.secpod.oval:def:505765
oval:org.secpod.oval:def:89002759
...

© SecPod Technologies