6.4
CVSSv2

CVE-2015-3294

Published: 08/05/2015 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The tcp_request function in Dnsmasq prior to 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote malicious users to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thekelleys dnsmasq

oracle solaris 11.2

Vendor Advisories

Dnsmasq could be made to crash or expose sensitive information if it received specially crafted network traffic ...
Debian Bug report logs - #683372 CVE-2012-3411: libvirt-controlled dnsmasq replies to DNS queries from non-virtual networks Package: dnsmasq; Maintainer for dnsmasq is Simon Kelley <simon@thekelleysorguk>; Source for dnsmasq is src:dnsmasq (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde& ...
Debian Bug report logs - #783459 dnsmasq: CVE-2015-3294: crash on receipt of certain malformed DNS requests Package: src:dnsmasq; Maintainer for src:dnsmasq is Simon Kelley <simon@thekelleysorguk>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 27 Apr 2015 08:21:07 UTC Severity: important Tags: fi ...
Nick Sampanis discovered that dnsmasq, a small caching DNS proxy and DHCP/TFTP server, did not properly check the return value of the setup_reply() function called during a TCP connection, which is used then as a size argument in a function which writes data on the client's connection A remote attacker could exploit this issue via a specially craf ...
The tcp_request function in Dnsmasq before 273rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request ...