Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3294

Опубликовано: 23 апр. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5dnsmasqWill not fix
Red Hat Enterprise Linux 6dnsmasqWill not fix
Red Hat Enterprise Linux 7dnsmasqWill not fix
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)dnsmasqWill not fix
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)dnsmasqWill not fix
Red Hat OpenStack Platform 4dnsmasqWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-252
https://bugzilla.redhat.com/show_bug.cgi?id=1215747dnsmasq: unchecked return value of the setup_reply() function

EPSS

Процентиль: 40%
0.00184
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

nvd
больше 10 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

debian
больше 10 лет назад

The tcp_request function in Dnsmasq before 2.73rc4 does not properly h ...

suse-cvrf
больше 11 лет назад

Recommended update for dnsmasq

suse-cvrf
почти 11 лет назад

Security update for dnsmasq

EPSS

Процентиль: 40%
0.00184
Низкий

4.3 Medium

CVSS2