8.3
CVSSv2

CVE-2020-25682

Published: 20/01/2021 Updated: 07/11/2023
CVSS v2 Base Score: 8.3 | Impact Score: 8.5 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 740
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:C

Vulnerability Summary

A flaw was found in dnsmasq prior to 2.83. A buffer overflow vulnerability exists in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thekelleys dnsmasq

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Synopsis Important: dnsmasq security update Type/Severity Security Advisory: Important Topic An update for dnsmasq is now available for Red Hat Enterprise Linux 82 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: OpenShift Container Platform 4433 bug fix and security update Type/Severity Security Advisory: Important Topic Red Hat OpenShift Container Platform release 4433 is now available withupdates to packages and images that fix several bugs and add enhancementsThis release also includes a ...
Synopsis Important: dnsmasq security update Type/Severity Security Advisory: Important Topic An update for dnsmasq is now available for Red Hat Enterprise Linux 81 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: dnsmasq security update Type/Severity Security Advisory: Important Topic An update for dnsmasq is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Moshe Kol and Shlomi Oberman of JSOF discovered several vulnerabilities in dnsmasq, a small caching DNS proxy and DHCP/TFTP server They could result in denial of service, cache poisoning or the execution of arbitrary code For the stable distribution (buster), these problems have been fixed in version 280-1+deb10u1 We recommend that you upgrade ...
A buffer overflow vulnerability was discovered in the way dnsmasq before version 283 extract names from DNS packets before validating them with DNSSEC data An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine T ...
A set of previously unknown vulnerabilities in the DNS forwarder implementation of dnsmasq were disclosed on January 19, 2021 The vulnerabilities are collectively known as DNSpooq Exploitation of these vulnerabilities could result in remote code execution or denial of service (DoS), or may allow an attacker to more easily forge DNS answers that c ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Multiple CVEs in dnsmasq fixed in version 283 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Riccardo Schirone ...

Recent Articles

Dnsmasq, used in only a million or more internet-facing devices globally, patches not-so-secret seven spoofing, hijacking flaws
The Register • Thomas Claburn in San Francisco • 20 Jan 2021

Get your updates when you can for gear from scores of manufacturers Two clichés, one headline: 'No good deed goes unpunished' and 'It's always DNS'

Seven vulnerabilities have been found in a popular DNS caching proxy and DHCP server known as dnsmasq, raising the possibility of widespread online attacks on networking devices. The flaws, collectively dubbed DNSpooq, were revealed on Tuesday by Israel-based security firm JSOF at the conclusion of a five-month coordinated disclosure period. The bugs are believed to affect products from more than 40 IT vendors, including Cisco, Comcast, Google, Netgear, Red Hat, and Ubiquiti, and major Linux dis...