Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
thekelleys dnsmasq vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-15107
A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.
Thekelleys Dnsmasq
7.5
CVSSv2
CVE-2017-14491
Heap-based buffer overflow in dnsmasq prior to 2.78 allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
Thekelleys Dnsmasq
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 7.1
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Suse Linux Enterprise Server 11
Suse Linux Enterprise Debuginfo 11
Suse Linux Enterprise Server 12
Suse Linux Enterprise Point Of Sale 11
Nvidia Linux For Tegra
1 EDB exploit
9 Github repositories
5
CVSSv2
CVE-2017-13704
In dnsmasq prior to 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq c...
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Novell Leap 42.2
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Fedoraproject Fedora 27
Novell Leap 42.3
Thekelleys Dnsmasq
7.5
CVSSv2
CVE-2017-14492
Heap-based buffer overflow in dnsmasq prior to 2.78 allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Thekelleys Dnsmasq
1 EDB exploit
7.5
CVSSv2
CVE-2017-14493
Stack-based buffer overflow in dnsmasq prior to 2.78 allows remote malicious users to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Opensuse Leap 42.3
Opensuse Leap 42.2
Thekelleys Dnsmasq
1 EDB exploit
4 Github repositories
4.3
CVSSv2
CVE-2017-14494
dnsmasq prior to 2.78, when configured as a relay, allows remote malicious users to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Novell Leap 42.2
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Novell Leap 42.3
Thekelleys Dnsmasq
1 EDB exploit
5
CVSSv2
CVE-2017-14495
Memory leak in dnsmasq prior to 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote malicious users to cause a denial of service (memory consumption) via vectors involving DNS response creation.
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Debian Debian Linux 7.1
Debian Debian Linux 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Thekelleys Dnsmasq
1 EDB exploit
7.8
CVSSv2
CVE-2017-14496
Integer underflow in the add_pseudoheader function in dnsmasq prior to 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote malicious users to cause a denial of service via a crafted DNS request.
Redhat Enterprise Linux Desktop 7.0
Google Android 7.1.2
Redhat Enterprise Linux Workstation 7.0
Google Android 5.0.2
Redhat Enterprise Linux Server 7.0
Google Android 6.0.1
Google Android 6.0
Debian Debian Linux 7.1
Novell Leap 42.2
Google Android 4.4.4
Debian Debian Linux 7.0
Google Android 7.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Google Android 8.0
Google Android 5.1.1
Canonical Ubuntu Linux 17.04
Debian Debian Linux 9.0
Google Android 7.1.1
Novell Leap 42.3
Thekelleys Dnsmasq
1 EDB exploit
3 Github repositories
1 Article
5
CVSSv2
CVE-2015-8899
Dnsmasq prior to 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Thekelleys Dnsmasq
6.4
CVSSv2
CVE-2015-3294
The tcp_request function in Dnsmasq prior to 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote malicious users to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
Thekelleys Dnsmasq
Oracle Solaris 11.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4644
unprivileged
CVE-2024-3494
CVE-2024-22460
CVE-2024-26026
CVE-2024-23473
firewall
CVE-2024-28889
XML external entity
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »