Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-14491
Severity
9.8CRITICAL
EPSS
57.8%
top 1.82%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 4
Latest updateApr 30
Description
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages22 packages
Also affects: Debian Linux 7.0, 7.1, 8.0, 9.0, Ubuntu Linux 12.04, 14.04, 16.04, 17.04
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
1📋Vendor Advisories
6Android▶
CVE-2017-14491: Android Security Bulletin 2021-03-01
CVE: CVE-2017-14491
Severity: HIGH
Type: RCE
Affected AOSP versions: 8↗2021-03-01
💬Community
3Bugzilla▶
CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 dnsmasq: various flaws [fedora-all]↗2017-10-02
Bugzilla
▶