cpe:/a:thekelleys:dnsmasq:2.77 cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:17.04 cpe:/o:debian:debian_linux:7.0 cpe:/o:debian:debian_linux:7.1 cpe:/o:debian:debian_linux:9.0 cpe:/o:novell:leap:42.2 cpe:/o:novell:leap:42.3 cpe:/o:redhat:enterprise_linux_desktop:6.0 cpe:/o:redhat:enterprise_linux_desktop:7.0 cpe:/o:redhat:enterprise_linux_server:6.0 cpe:/o:redhat:enterprise_linux_server:7.0 cpe:/o:redhat:enterprise_linux_workstation:6.0 cpe:/o:redhat:enterprise_linux_workstation:7.0 CVE-2017-14491 2017-10-03T21:29:02.870-04:00 2018-05-10T21:29:03.437-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov BID 101085 BID 101977 SECTRACK 1039474 EXPLOIT-DB 42941 DEBIAN DSA-3989 GENTOO GLSA-201710-27 REDHAT RHSA-2017:2836 REDHAT RHSA-2017:2837 REDHAT RHSA-2017:2838 REDHAT RHSA-2017:2839 REDHAT RHSA-2017:2840 REDHAT RHSA-2017:2841 UBUNTU USN-3430-1 UBUNTU USN-3430-2 CERT-VN VU#973527 MLIST [dnsmasq-discuss] 20171002 Announce: dnsmasq-2.78. MLIST [dnsmasq-discuss] 20171002 IMPORTANT SECURITY INFORMATION. CONFIRM http://nvidia.custhelp.com/app/answers/detail/a_id/4561 CONFIRM http://thekelleys.org.uk/dnsmasq/CHANGELOG CONFIRM http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc CONFIRM http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt CONFIRM https://access.redhat.com/security/vulnerabilities/3199382 CONFIRM https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf MISC https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html CONFIRM https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq SUSE openSUSE-SU-2017:2633 Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.