[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-25681Date: (C)2021-01-21   (M)2023-12-22


A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.1CVSS Score : 8.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 5.9Impact Score: 8.5
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
DSA-4844
FEDORA-2021-2e4c3d5a9d
FEDORA-2021-84440e87ba
GLSA-202101-17
https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html
https://bugzilla.redhat.com/show_bug.cgi?id=1881875
https://www.jsof-tech.com/disclosures/dnspooq/

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/a:thekelleys:dnsmasq
CWE    1
CWE-122
OVAL    18
oval:org.secpod.oval:def:89002836
oval:org.secpod.oval:def:89002787
oval:org.secpod.oval:def:505765
oval:org.secpod.oval:def:89002759
...

© SecPod Technologies