Severity
7.5HIGH
EPSS
79.3%
top 0.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 14

Description

In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

Debiandnsmasq< 2.78-1+3
NVDnovell/leap42.2, 42.3+1

Also affects: Debian Linux 7.0, 7.1, 9.0, Fedora 27, Ubuntu Linux 14.04, 16.04, 17.04

🔴Vulnerability Details

3
GHSA
GHSA-mprq-hpvv-8wcc: In dnsmasq before 22022-05-14
OSV
CVE-2017-13704: In dnsmasq before 22017-10-03
CVEList
CVE-2017-13704: In dnsmasq before 22017-10-02

📋Vendor Advisories

2
Red Hat
dnsmasq: Size parameter overflow via large DNS query2017-08-21
Debian
CVE-2017-13704: dnsmasq - In dnsmasq before 2.78, if the DNS packet size does not match the expected size,...2017

💬Community

1
Bugzilla
CVE-2017-13704 dnsmasq: Size parameter overflow via large DNS query2017-09-26
CVE-2017-13704 (HIGH CVSS 7.5) | In dnsmasq before 2.78 | cvebase.io