A vulnerability was found in Dnsmasq's implementation of DNSSEC. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.
Find out more about CVE-2017-15107 from the MITRE CVE dictionary dictionary and NIST NVD.
Versions of Dnsmasq shipped with Red Hat Enterprise Linux are built without DNSSEC support, so they are not affected by this issue.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 5.4 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L |
Attack Vector | Network |
Attack Complexity | High |
Privileges Required | None |
User Interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity Impact | Low |
Availability Impact | Low |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 9.0 | dnsmasq | Not affected |
Red Hat OpenStack Platform 8.0 (Liberty) | dnsmasq | Not affected |
Red Hat OpenStack Platform 12.0 | dnsmasq | Not affected |
Red Hat OpenStack Platform 11.0 (Ocata) | dnsmasq | Not affected |
Red Hat OpenStack Platform 10 | dnsmasq | Not affected |
Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7 | dnsmasq | Not affected |
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 | dnsmasq | Not affected |
Red Hat Enterprise Linux 7 | dnsmasq | Not affected |
Red Hat Enterprise Linux 6 | dnsmasq | Not affected |
Red Hat Enterprise Linux 5 | dnsmasq | Not affected |