CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.0%
Severity: Critical
Date : 2017-10-02
CVE-ID : CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494
CVE-2017-14495 CVE-2017-14496
Package : dnsmasq
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-421
The package dnsmasq before version 2.78-1 is vulnerable to multiple
issues including arbitrary code execution, denial of service and
information disclosure.
Upgrade to 2.78-1.
The problems have been fixed upstream in version 2.78.
None.
A heap buffer overflow was found in dnsmasq in the code responsible for
building DNS replies. An attacker could send crafted DNS packets to
dnsmasq which would cause it to crash or, potentially, execute
arbitrary code.
A heap buffer overflow was discovered in dnsmasq in the IPv6 router
advertisement (RA) handling code. An attacker on the local network
segment could send crafted RAs to dnsmasq which would cause it to crash
or, potentially, execute arbitrary code. This issue only affected
configurations using one of these options: enable-ra, ra-only, slaac,
ra-names, ra-advrouter, or ra-stateless.
A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An
attacker on the local network could send a crafted DHCPv6 request to
dnsmasq which would cause it to a crash or, potentially, execute
arbitrary code.
An information leak was found in dnsmasq in the DHCPv6 relay code. An
attacker on the local network could send crafted DHCPv6 packets to
dnsmasq causing it to forward the contents of process memory,
potentially leaking sensitive data.
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An
attacker could send crafted DNS packets which would trigger memory
allocations which would never be freed, leading to unbounded memory
consumption and eventually a crash. This issue only affected
configurations using one of the options: add-mac, add-cpe-id, or add-
subnet.
An integer underflow flaw leading to a buffer over-read was found in
dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets
to dnsmasq which would cause it to crash. This issue only affected
configurations using one of the options: add-mac, add-cpe-id, or add-
subnet.
A remote attacker is able to execute arbitrary code, disclose sensitive
information or crash the application by sending specially crafted
packets.
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
https://github.com/google/security-research-pocs/tree/master/vulnerabilities/dnsmasq
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=24036ea507862c7b7898b68289c8130f85599c10
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=3d4ff1ba8419546490b464418223132529514033
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=51eadb692a5123b9838e5a68ecace3ac579a3a45
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7
https://security.archlinux.org/CVE-2017-14491
https://security.archlinux.org/CVE-2017-14492
https://security.archlinux.org/CVE-2017-14493
https://security.archlinux.org/CVE-2017-14494
https://security.archlinux.org/CVE-2017-14495
https://security.archlinux.org/CVE-2017-14496
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=24036ea507862c7b7898b68289c8130f85599c10
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=3d4ff1ba8419546490b464418223132529514033
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=51eadb692a5123b9838e5a68ecace3ac579a3a45
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f
thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7
github.com/google/security-research-pocs/tree/master/vulnerabilities/dnsmasq
security.archlinux.org/AVG-421
security.archlinux.org/CVE-2017-14491
security.archlinux.org/CVE-2017-14492
security.archlinux.org/CVE-2017-14493
security.archlinux.org/CVE-2017-14494
security.archlinux.org/CVE-2017-14495
security.archlinux.org/CVE-2017-14496
security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.0%