CVE-2021-45955

Severity
9.8CRITICAL
EPSS
0.0%
top 86.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 1
Latest updateJan 2

Description

Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c) because of the lack of a proper bounds check upon pseudo header re-insertion. NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge." However, a contributor states that a security patch (mentioned in 016162.html) is needed

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-p5g5-mjp3-mr9m: Dnsmasq 22022-01-02
CVEList
CVE-2021-45955: Dnsmasq 22021-12-31

📋Vendor Advisories

2
Red Hat
dnsmasq: heap-based buffer overflow in resize_packet2022-01-01
Microsoft
Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c) because of the lack of a proper bounds check upon pseudo header re-insertion. NOTE: the2021-12-14
CVE-2021-45955 (CRITICAL CVSS 9.8) | Dnsmasq 2.86 has a heap-based buffe | cvebase.io