445
VMScore

CVE-2017-13704

Published: 03/10/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In dnsmasq prior to 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

debian debian linux 7.1

novell leap 42.2

debian debian linux 7.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 17.04

debian debian linux 9.0

fedoraproject fedora 27

novell leap 42.3

thekelleys dnsmasq

Vendor Advisories

Debian Bug report logs - #877102 dnsmasq: CVE-2017-13704: Size parameter overflow via large DNS query Package: src:dnsmasq; Maintainer for src:dnsmasq is Simon Kelley <simon@thekelleysorguk>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 28 Sep 2017 18:39:02 UTC Severity: grave Tags: fixed-upstre ...
An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the DNS code An attacker could send crafted DNS packets to dnsmasq which would cause it to crash ...