Логотип exploitDog
bind:"CVE-2020-25683"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-25683"

Количество 15

Количество 15

ubuntu логотип

CVE-2020-25683

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 5.9
EPSS: Средний
redhat логотип

CVE-2020-25683

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2020-25683

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 5.9
EPSS: Средний
msrc логотип

CVE-2020-25683

больше 4 лет назад

CVSS3: 5.9
EPSS: Средний
debian логотип

CVE-2020-25683

больше 4 лет назад

A flaw was found in dnsmasq before version 2.83. A heap-based buffer o ...

CVSS3: 5.9
EPSS: Средний
github логотип

GHSA-4g83-8xc3-pp6v

больше 3 лет назад

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

EPSS: Средний
fstec логотип

BDU:2021-03622

больше 4 лет назад

Уязвимость функции extract_name() (rfc1035.c) DNS-сервера Dnsmasq, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2021:0129-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0124-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14604-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0166-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0163-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0162-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
oracle-oval логотип

ELSA-2021-0150

больше 4 лет назад

ELSA-2021-0150: dnsmasq security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14603-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-25683

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 5.9
30%
Средний
больше 4 лет назад
redhat логотип
CVE-2020-25683

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 5.9
30%
Средний
больше 4 лет назад
nvd логотип
CVE-2020-25683

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 5.9
30%
Средний
больше 4 лет назад
msrc логотип
CVSS3: 5.9
30%
Средний
больше 4 лет назад
debian логотип
CVE-2020-25683

A flaw was found in dnsmasq before version 2.83. A heap-based buffer o ...

CVSS3: 5.9
30%
Средний
больше 4 лет назад
github логотип
GHSA-4g83-8xc3-pp6v

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability.

30%
Средний
больше 3 лет назад
fstec логотип
BDU:2021-03622

Уязвимость функции extract_name() (rfc1035.c) DNS-сервера Dnsmasq, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
30%
Средний
больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0129-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0124-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14604-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0166-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0163-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:0162-1

Security update for dnsmasq

больше 4 лет назад
oracle-oval логотип
ELSA-2021-0150

ELSA-2021-0150: dnsmasq security update (IMPORTANT)

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:14603-1

Security update for dnsmasq

больше 4 лет назад

Уязвимостей на страницу