7.5
CVSSv3

CVE-2017-14496

Published: 03/10/2017 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 786
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Integer underflow in the add_pseudoheader function in dnsmasq prior to 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote malicious users to cause a denial of service via a crafted DNS request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux desktop 7.0

google android 7.1.2

redhat enterprise linux workstation 7.0

google android 5.0.2

redhat enterprise linux server 7.0

google android 6.0.1

google android 6.0

debian debian linux 7.1

novell leap 42.2

google android 4.4.4

debian debian linux 7.0

google android 7.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

google android 8.0

google android 5.1.1

canonical ubuntu linux 17.04

debian debian linux 9.0

google android 7.1.1

novell leap 42.3

thekelleys dnsmasq

Vendor Advisories

Synopsis Critical: dnsmasq security update Type/Severity Security Advisory: Critical Topic An update for dnsmasq is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring System (CVSS) base score, wh ...
Debian Bug report logs - #877102 dnsmasq: CVE-2017-13704: Size parameter overflow via large DNS query Package: src:dnsmasq; Maintainer for src:dnsmasq is Simon Kelley <simon@thekelleysorguk>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 28 Sep 2017 18:39:02 UTC Severity: grave Tags: fixed-upstre ...
Felix Wilhelm, Fermin J Serna, Gabriel Campana, Kevin Hamacher, Ron Bowes and Gynvael Coldwind of the Google Security Team discovered several vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP server, which may result in denial of service, information leak or the execution of arbitrary code For the oldstable distribution (jessie) ...
Several security issues were fixed in Dnsmasq ...
USN-3430-2 introduced regression in Dnsmasq ...
Several security issues were fixed in Dnsmasq ...
Information leak in the DHCPv6 relay codeAn information leak was found in dnsmasq in the DHCPv6 relay code An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data (CVE-2017-14494) Memory exhaustion vulnerability in the EDNS0 codeA memory ...
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet (CVE-2017 ...
An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code An attacker could send crafted DNS packets to dnsmasq which would cause it to crash This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet ...

Exploits

''' Sources: rawgithubusercontentcom/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14496py securitygoogleblogcom/2017/10/behind-masq-yet-more-dns-and-dhcphtml dnsmasq is vulnerable only if one of the following option is specified: --add-mac, --add-cpe-id or --add-subnet ============================== ...
Dnsmasq versions prior to 278 suffer from an integer underflow vulnerability ...

Github Repositories

Safe libc using introspection

What is this? This code consists of wrapper functions that filter parameters of potentially "unsafe" libc functions (like gets) to make them usable without the risk of of buffer overflows How does it work? Code is instrumented with AddressSanitizer and wrapper functions around (potentially) unsafe libc functions use information from AddressSanitizer to prevent buffer

Safe libc How to build # llvm toolchain [ ! -d $HOME/git ] && mkdir $HOME/git cd $HOME/git git clone githubcom/introspection-libc/safe-libc-evaluation git clone githubcom/introspection-libc/safe-libc safec git clone githubcom/introspection-libc/llvm (cd llvm/tools && git clone githubcom/introspection-libc/clang

What is this? This code consists of wrapper functions that filter parameters of potentially "unsafe" libc functions (like gets) to make them usable without the risk of of buffer overflows How does it work? Code is instrumented with AddressSanitizer and wrapper functions around (potentially) unsafe libc functions use information from AddressSanitizer to prevent buffer

Recent Articles

Patch your Android, peeps, it has up to 14 nasty flaws to flog
The Register • Iain Thomson in San Francisco • 03 Oct 2017

There's a nasty bug in media file handling – deja vu, right?

Another month, another round of Android patches – although October's batch is pleasantly small compared to other recent releases. Of the 14 CVE flaws released, six cover Android's troubled media processing and playback engine. This means miscreants can fling malicious files at devices to potentially hijack them. The privilege escalation bugs can be used by dodgy apps to gain control of handsets and tablets. There's also a remote-code execution flaw in the Dnsmasq tool used by Android. Details ...