Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-68qg-cgxp-wxcf

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

EPSS

Процентиль: 40%
0.00184
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

redhat
почти 11 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

nvd
больше 10 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

debian
больше 10 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly h ...

suse-cvrf
больше 11 лет назад

Recommended update for dnsmasq

EPSS

Процентиль: 40%
0.00184
Низкий