Логотип exploitDog
bind:"BDU:2021-03624" OR bind:"CVE-2020-25684"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-03624" OR bind:"CVE-2020-25684"

Количество 16

Количество 16

fstec логотип

BDU:2021-03624

больше 4 лет назад

Уязвимость функции reply_query() (forward.c) DNS-сервера Dnsmasq, связанная с ошибками реализации проверки безопасности для стандартных элементов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2020-25684

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 3.7
EPSS: Низкий
redhat логотип

CVE-2020-25684

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2020-25684

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 3.7
EPSS: Низкий
msrc логотип

CVE-2020-25684

больше 4 лет назад

CVSS3: 3.7
EPSS: Низкий
debian логотип

CVE-2020-25684

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. When getting a reply ...

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-xqvc-9mc9-4fgx

больше 3 лет назад

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 3.7
EPSS: Низкий
oracle-oval логотип

ELSA-2021-0153

больше 4 лет назад

ELSA-2021-0153: dnsmasq security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0129-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0124-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14604-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0166-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0163-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0162-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
oracle-oval логотип

ELSA-2021-0150

больше 4 лет назад

ELSA-2021-0150: dnsmasq security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14603-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-03624

Уязвимость функции reply_query() (forward.c) DNS-сервера Dnsmasq, связанная с ошибками реализации проверки безопасности для стандартных элементов, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 3.7
1%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-25684

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 3.7
1%
Низкий
больше 4 лет назад
redhat логотип
CVE-2020-25684

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 4
1%
Низкий
больше 4 лет назад
nvd логотип
CVE-2020-25684

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 3.7
1%
Низкий
больше 4 лет назад
msrc логотип
CVSS3: 3.7
1%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-25684

A flaw was found in dnsmasq before version 2.83. When getting a reply ...

CVSS3: 3.7
1%
Низкий
больше 4 лет назад
github логотип
GHSA-xqvc-9mc9-4fgx

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.

CVSS3: 3.7
1%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2021-0153

ELSA-2021-0153: dnsmasq security update (MODERATE)

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0129-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0124-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14604-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0166-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0163-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0162-1

Security update for dnsmasq

больше 4 лет назад
oracle-oval логотип
ELSA-2021-0150

ELSA-2021-0150: dnsmasq security update (IMPORTANT)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14603-1

Security update for dnsmasq

больше 4 лет назад

Уязвимостей на страницу