CVE-2020-25685

CWE-326CWE-340CWE-35812 documents10 sources
Severity
3.7LOW
EPSS
0.3%
top 45.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 20
Latest updateMay 24

Description

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forg

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages4 packages

NVDthekelleys/dnsmasq< 2.83
Debiandnsmasq< 2.83-1+3
CVEListV5dnsmasqdnsmasq 2.83
NVDarista/eos4.214.21.14m+4

Also affects: Debian Linux 10.0, Fedora 32, 33

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9gxq-wfg7-72x4: A flaw was found in dnsmasq before version 22022-05-24
OSV
CVE-2020-25685: A flaw was found in dnsmasq before version 22021-01-20
CVEList
CVE-2020-25685: A flaw was found in dnsmasq before version 22021-01-20

📋Vendor Advisories

7
Red Hat
dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker2021-01-19
Cisco
Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 20212021-01-19
Ubuntu
Dnsmasq vulnerabilities2021-01-19
Red Hat
dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker2021-01-19
Microsoft
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query dnsmasq checks in forward.c:reply_query() which is the forwarded query that matches the reply by only using2021-01-12

💬Community

1
Bugzilla
CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker2020-10-20