Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
9.8CRITICAL
EPSS
57.8%
top 1.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 4
Latest updateApr 30

Description

Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages22 packages

Androidplatform/external/dnsmasq8.1:08.1:2021-03-01+3
Debiandnsmasq< 2.78-1+3
Ubuntudnsmasq< 2.68-1ubuntu0.2+1
NVDarista/eos4.164.16.13m+3

Also affects: Debian Linux 7.0, 7.1, 8.0, 9.0, Ubuntu Linux 12.04, 14.04, 16.04, 17.04

Patches

🔴Vulnerability Details

5
GHSA
GHSA-m4px-ph3f-7964: Heap-based buffer overflow in dnsmasq before 22022-04-30
OSV
CVE-2017-14491: In do_rfc1035_name of util2021-03-01
OSV
CVE-2017-14491: Heap-based buffer overflow in dnsmasq before 22017-10-04
CVEList
CVE-2017-14491: Heap-based buffer overflow in dnsmasq before 22017-10-02
OSV
dnsmasq vulnerabilities2017-10-02

💥Exploits & PoCs

1
Exploit-DB
Dnsmasq < 2.78 - 2-byte Heap Overflow2017-10-02

📋Vendor Advisories

6
Android
CVE-2017-14491: Android Security Bulletin 2021-03-01 CVE: CVE-2017-14491 Severity: HIGH Type: RCE Affected AOSP versions: 82021-03-01
Red Hat
dnsmasq: Improper bounds checking leads to a buffer overread2019-08-09
Ubuntu
Dnsmasq vulnerabilities2017-10-03
Red Hat
dnsmasq: heap overflow in the code responsible for building DNS replies2017-10-02
Ubuntu
Dnsmasq vulnerabilities2017-10-02

💬Community

3
Bugzilla
CVE-2019-14513 dnsmasq: Improper bounds checking leads to a buffer overread2019-08-09
Bugzilla
CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 dnsmasq: various flaws [fedora-all]2017-10-02
Bugzilla
CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies2017-09-26