7.5
CVSSv3

CVE-2017-14495

Published: 03/10/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Memory leak in dnsmasq prior to 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote malicious users to cause a denial of service (memory consumption) via vectors involving DNS response creation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

debian debian linux 7.1

debian debian linux 7.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 17.04

debian debian linux 9.0

thekelleys dnsmasq

Vendor Advisories

Synopsis Critical: dnsmasq security update Type/Severity Security Advisory: Critical Topic An update for dnsmasq is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring System (CVSS) base score, wh ...
Felix Wilhelm, Fermin J Serna, Gabriel Campana, Kevin Hamacher, Ron Bowes and Gynvael Coldwind of the Google Security Team discovered several vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP server, which may result in denial of service, information leak or the execution of arbitrary code For the oldstable distribution (jessie) ...
Several security issues were fixed in Dnsmasq ...
USN-3430-2 introduced regression in Dnsmasq ...
Several security issues were fixed in Dnsmasq ...
Information leak in the DHCPv6 relay codeAn information leak was found in dnsmasq in the DHCPv6 relay code An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data (CVE-2017-14494) Memory exhaustion vulnerability in the EDNS0 codeA memory ...
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet (CVE-2017 ...
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet ...

Exploits

''' Sources: rawgithubusercontentcom/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14495py securitygoogleblogcom/2017/10/behind-masq-yet-more-dns-and-dhcphtml dnsmasq is vulnerable only if one of the following option is specified: --add-mac, --add-cpe-id or --add-subnet ''' #!/usr/bin/python # # Cop ...
Dnsmasq versions prior to 278 suffer from a lack of free() denial of service vulnerability ...