4.3
CVSSv2

CVE-2021-3448

Published: 08/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4 | Impact Score: 1.4 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A flaw was found in dnsmasq in versions prior to 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thekelleys dnsmasq

redhat enterprise linux 8.0

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

oracle communications cloud native core network function cloud native environment 1.9.0

Vendor Advisories

No description is available for this CVE ...
A security issue was found in dnsmasq before version 285 When configured with --server=<address>@<interface> or similar (eg through dbus), dnsmasq configures a fixed UDP port for all outgoing queries to the specified upstream DNS server If an attacker is able to discover the opened port through other means (eg port scanning, gues ...