Описание
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | dnsmasq | Will not fix | ||
| Red Hat Enterprise Linux 6 | dnsmasq | Will not fix | ||
| Red Hat Enterprise Linux 7 | dnsmasq | Will not fix | ||
| Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse) | dnsmasq | Will not fix | ||
| Red Hat Enterprise Linux OpenStack Platform 6 (Juno) | dnsmasq | Will not fix | ||
| Red Hat OpenStack Platform 4 | dnsmasq | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
The tcp_request function in Dnsmasq before 2.73rc4 does not properly h ...
EPSS
4.3 Medium
CVSS2