var-201710-0449
Vulnerability from variot
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: dnsmasq security update Advisory ID: RHSA-2017:2836-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2836 Issue date: 2017-10-02 CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 =====================================================================
- Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
-
A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. (CVE-2017-14491)
-
A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)
-
A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)
-
An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494)
-
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14495)
-
An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet. (CVE-2017-14496)
Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for reporting these issues.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies 1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code 1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code 1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code 1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code 1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
aarch64: dnsmasq-2.76-2.el7_4.2.aarch64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-2.76-2.el7_4.2.ppc64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-2.76-2.el7_4.2.s390x.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm dnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm
ppc64: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm
ppc64le: dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm dnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm
s390x: dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm dnsmasq-utils-2.76-2.el7_4.2.s390x.rpm
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64: dnsmasq-2.76-2.el7_4.2.x86_64.rpm dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-14491 https://access.redhat.com/security/cve/CVE-2017-14492 https://access.redhat.com/security/cve/CVE-2017-14493 https://access.redhat.com/security/cve/CVE-2017-14494 https://access.redhat.com/security/cve/CVE-2017-14495 https://access.redhat.com/security/cve/CVE-2017-14496 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/security/vulnerabilities/3199382
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX SfoCV7+qG2nwqlHKLZOlhIU= =iWfU -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . =========================================================================== Ubuntu Security Notice USN-3430-3 January 04, 2018
dnsmasq regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
USN-3430-2 introduced regression in Dnsmasq.
Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-3430-2 fixed several vulnerabilities. The update introduced a new regression that breaks DNS resolution. This update addresses the problem.
We apologize for the inconvenience.
Original advisory details:
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14491)
Felix Wilhelm, Fermin J. (CVE-2017-14492)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 requests. (CVE-2017-14493)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: dnsmasq=C2=A02.59-4ubuntu0.4 dnsmasq-base2.59-4ubuntu0.4 dnsmasq-utils2.59-4ubuntu0.4
After a standard system update you need to reboot your computer to make all the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64
-
Gentoo Linux Security Advisory GLSA 201710-27
https://security.gentoo.org/
Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: October 23, 2017 Bugs: #632692 ID: 201710-27
Synopsis
Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/dnsmasq < 2.78 >= 2.78
Description
Multiple vulnerabilities have been discovered in Dnsmasq.
Workaround
There is no known workaround at this time.
Resolution
All Dnsmasq users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"
References
[ 1 ] CVE-2017-14491 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491 [ 2 ] CVE-2017-14492 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492 [ 3 ] CVE-2017-14493 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493 [ 4 ] CVE-2017-14494 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494 [ 5 ] CVE-2017-14495 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495 [ 6 ] CVE-2017-14496 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201710-27
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "leap", "scope": "eq", "trust": 1.3, "vendor": "opensuse", "version": "42.3" }, { "model": "leap", "scope": "eq", "trust": 1.3, "vendor": "opensuse", "version": "42.2" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.1" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "dnsmasq", "scope": "lte", "trust": 1.0, "vendor": "thekelleys", "version": "2.77" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.9, "vendor": "thekelleys", "version": "2.77" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ruckus", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "technicolor", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "zyxel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dnsmasq", "version": null }, { "model": "ubuntu", "scope": null, "trust": 0.8, "vendor": "canonical", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "leap", "scope": null, "trust": 0.8, "vendor": "opensuse", "version": null }, { "model": "dnsmasq", "scope": "lt", "trust": 0.8, "vendor": "thekelleys", "version": "2.78" }, { "model": "enterprise linux desktop", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux server", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux workstation", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "enterprise linux server year extended update support", "scope": "eq", "trust": 0.6, "vendor": "redhat", "version": "-47.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "17.04" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "16.04" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.2.2" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.75" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.72" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.71" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.70" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.7" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.65" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.64" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.63" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.62" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.61" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.60" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.59" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.58" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.57" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.56" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.55" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.54" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.53" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.52" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.51" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.50" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.49" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.48" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.47" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.46" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.45" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.44" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.43" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.42" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.41" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.40" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.4" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.38" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.37" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.36" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.35" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.34" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.33" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.30" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.29" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.28" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.27" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.26" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.25" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.24" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.23" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.22" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.21" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.20" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.2" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.19" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "2.10" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.9" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.8" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.5" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.4" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.3" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.18" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.17" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.16" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.15" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.14" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.13" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.12" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.11" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.10" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "1.0" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.996" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.992" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.98" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.96" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.95" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.7" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.6" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.5" }, { "model": "dnsmasq", "scope": "eq", "trust": 0.3, "vendor": "thekelleys", "version": "0.4" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server optional aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server for arm", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6.2" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update suppor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server year extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-47.2" }, { "model": "enterprise linux server year extended upd", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-47.3" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux long life server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.9" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux for scientific computing", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update supp", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for power little endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for power big endian", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux for power little endian extended update suppo", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power little endian extended update suppo", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for power big endian extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux for ibm z systems extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux for ibm z systems", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.4" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux eus compute node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux computenode optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux computenode optional eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux computenode optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux computenode eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux computenode eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux computenode", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.7.6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.7" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.6.10" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.6" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.5.7" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.5" }, { "model": "kubernetes", "scope": "eq", "trust": 0.3, "vendor": "kubernetes", "version": "1.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.1.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.1.1" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "5.0.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "4.4.4" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.1.2" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "7.0" }, { "model": "android", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "6.0" }, { "model": "fedora", "scope": "eq", "trust": 0.3, "vendor": "fedoraproject", "version": "27" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux ia-30", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "7" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "dnsmasq", "scope": "ne", "trust": 0.3, "vendor": "thekelleys", "version": "2.78" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.8" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.7.7" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.6.11" }, { "model": "kubernetes", "scope": "ne", "trust": 0.3, "vendor": "kubernetes", "version": "1.5.8" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.77", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-14493" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Gabriel Campana, Kevin Hamacher and Ron Bowes of the Google Security Team,Felix Wilhelm, Fermin J. Serna", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 0.6 }, "cve": "CVE-2017-14493", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2017-14493", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-14493", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-14493", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-201709-745", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-14493", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: dnsmasq security update\nAdvisory ID: RHSA-2017:2836-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:2836\nIssue date: 2017-10-02\nCVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 \n CVE-2017-14494 CVE-2017-14495 CVE-2017-14496 \n=====================================================================\n\n1. Summary:\n\nAn update for dnsmasq is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name\nServer) forwarder and DHCP (Dynamic Host Configuration Protocol) server. \n\nSecurity Fix(es):\n\n* A heap buffer overflow was found in dnsmasq in the code responsible for\nbuilding DNS replies. \n(CVE-2017-14491)\n\n* A heap buffer overflow was discovered in dnsmasq in the IPv6 router\nadvertisement (RA) handling code. This issue only affected\nconfigurations using one of these options: enable-ra, ra-only, slaac,\nra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)\n\n* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)\n\n* An information leak was found in dnsmasq in the DHCPv6 relay code. An\nattacker on the local network could send crafted DHCPv6 packets to dnsmasq\ncausing it to forward the contents of process memory, potentially leaking\nsensitive data. (CVE-2017-14494)\n\n* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An\nattacker could send crafted DNS packets which would trigger memory\nallocations which would never be freed, leading to unbounded memory\nconsumption and eventually a crash. This issue only affected configurations\nusing one of the options: add-mac, add-cpe-id, or add-subnet. \n(CVE-2017-14495)\n\n* An integer underflow flaw leading to a buffer over-read was found in\ndnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to\ndnsmasq which would cause it to crash. This issue only affected\nconfigurations using one of the options: add-mac, add-cpe-id, or\nadd-subnet. (CVE-2017-14496)\n\nRed Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J. \nSerna (Google Security Team), Gabriel Campana (Google Security Team), Kevin\nHamacher (Google Security Team), and Ron Bowes (Google Security Team) for\nreporting these issues. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies\n1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code\n1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code\n1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code\n1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code\n1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\naarch64:\ndnsmasq-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm\n\nppc64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm\n\nppc64le:\ndnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm\ndnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm\n\ns390x:\ndnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm\ndnsmasq-utils-2.76-2.el7_4.2.s390x.rpm\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\ndnsmasq-2.76-2.el7_4.2.src.rpm\n\nx86_64:\ndnsmasq-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\ndnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm\ndnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-14491\nhttps://access.redhat.com/security/cve/CVE-2017-14492\nhttps://access.redhat.com/security/cve/CVE-2017-14493\nhttps://access.redhat.com/security/cve/CVE-2017-14494\nhttps://access.redhat.com/security/cve/CVE-2017-14495\nhttps://access.redhat.com/security/cve/CVE-2017-14496\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://access.redhat.com/security/vulnerabilities/3199382\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX\nSfoCV7+qG2nwqlHKLZOlhIU=\n=iWfU\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n===========================================================================\nUbuntu Security Notice USN-3430-3\nJanuary 04, 2018\n\ndnsmasq regression\n===========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nUSN-3430-2 introduced regression in Dnsmasq. \n\nSoftware Description:\n- dnsmasq: Small caching DNS proxy and DHCP/TFTP server\n\nDetails:\n\nUSN-3430-2 fixed several vulnerabilities. The update introduced a new\nregression that breaks DNS resolution. This update addresses the\nproblem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. \n(CVE-2017-14491)\n\nFelix Wilhelm, Fermin J. (CVE-2017-14492)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 requests. \n(CVE-2017-14493)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)\n\nFelix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher\ndiscovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n dnsmasq=C2=A02.59-4ubuntu0.4\n dnsmasq-base2.59-4ubuntu0.4\n dnsmasq-utils2.59-4ubuntu0.4\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64\n\n3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201710-27\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Dnsmasq: Multiple vulnerabilities\n Date: October 23, 2017\n Bugs: #632692\n ID: 201710-27\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Dnsmasq, the worst of which\nmay allow remote attackers to execute arbitrary code. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-dns/dnsmasq \u003c 2.78 \u003e= 2.78 \n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Dnsmasq. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Dnsmasq users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-dns/dnsmasq-2.78\"\n\nReferences\n==========\n\n[ 1 ] CVE-2017-14491\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491\n[ 2 ] CVE-2017-14492\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492\n[ 3 ] CVE-2017-14493\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493\n[ 4 ] CVE-2017-14494\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494\n[ 5 ] CVE-2017-14495\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495\n[ 6 ] CVE-2017-14496\n https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201710-27\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CERT/CC", "id": "VU#973527" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "BID", "id": "101085" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42943", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14493" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#973527", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2017-14493", "trust": 3.4 }, { "db": "BID", "id": "101085", "trust": 2.0 }, { "db": "SECTRACK", "id": "1039474", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "42943", "trust": 1.1 }, { "db": "ICS CERT", "id": "ICSA-17-332-01", "trust": 0.9 }, { "db": "JVN", "id": "JVNVU93453933", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-008620", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-745", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2017-14493", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144490", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144484", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145652", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144477", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144469", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144706", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "id": "VAR-201710-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.24812031 }, "last_update_date": "2023-12-26T00:11:30.475000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DSA-3989", "trust": 0.8, "url": "https://www.debian.org/security/2017/dsa-3989" }, { "title": "Security Bulletin: NVIDIA Tegra Jetson L4T contains multiple vulnerabilities; updates for \u201cBlueBorne\u201d and \u201cDnsmasq\u201d.", "trust": 0.8, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "title": "openSUSE-SU-2017:2633", "trust": 0.8, "url": "https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "title": "RHSA-2017:2836", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2017:2836" }, { "title": "RHSA-2017:2837", "trust": 0.8, "url": "https://access.redhat.com/errata/rhsa-2017:2837" }, { "title": "Security fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow.", "trust": 0.8, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033" }, { "title": "CHANGELOG", "trust": 0.8, "url": "http://thekelleys.org.uk/dnsmasq/changelog" }, { "title": "USN-3430-1", "trust": 0.8, "url": "https://usn.ubuntu.com/usn/usn-3430-1/" }, { "title": "USN-3430-2", "trust": 0.8, "url": "https://usn.ubuntu.com/usn/usn-3430-2/" }, { "title": "Dnsmasq Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92841" }, { "title": "Red Hat: Critical: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20172837 - security advisory" }, { "title": "Red Hat: Critical: dnsmasq security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20172836 - security advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2017-14493" }, { "title": "Ubuntu Security Notice: dnsmasq vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3430-2" }, { "title": "Ubuntu Security Notice: dnsmasq regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3430-3" }, { "title": "Ubuntu Security Notice: dnsmasq vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3430-1" }, { "title": "Debian Security Advisories: DSA-3989-1 dnsmasq -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5c18698ecfe74c7de381531f8ed44dcf" }, { "title": "Amazon Linux 2: ALAS2-2019-1251", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2019-1251" }, { "title": "Amazon Linux AMI: ALAS-2017-907", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2017-907" }, { "title": "Arch Linux Advisories: [ASA-201710-1] dnsmasq: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-201710-1" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=6283337cd31f81f24d445925f2138c0e" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=7251d5e5f2b1771951980ad7cfde50ba" }, { "title": "bof-dnsmasq-cve-2017-14493", "trust": 0.1, "url": "https://github.com/pupiles/bof-dnsmasq-cve-2017-14493 " }, { "title": "Safe libc", "trust": 0.1, "url": "https://github.com/introspection-libc/main " }, { "title": "What is this?\nHow does it work?\nHow to build the toolchain\nHow to build a program using the safe libc\nAnd in the real world?", "trust": 0.1, "url": "https://github.com/pekd/safe-libc " }, { "title": "What is this?\nHow does it work?\nHow to build the toolchain\nHow to build a program using the safe libc\nAnd in the real world?", "trust": 0.1, "url": "https://github.com/introspection-libc/safe-libc " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/lnick2023/nicenice " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/google-warns-of-dos-and-rce-bugs-in-dnsmasq/128238/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 }, { "problemtype": "CWE-121", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "NVD", "id": "CVE-2017-14493" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.kb.cert.org/vuls/id/973527" }, { "trust": 2.8, "url": "https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/101085" }, { "trust": 2.2, "url": "https://access.redhat.com/errata/rhsa-2017:2837" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2017:2836" }, { "trust": 2.0, "url": "http://www.debian.org/security/2017/dsa-3989" }, { "trust": 1.7, "url": "http://www.thekelleys.org.uk/dnsmasq/doc.html" }, { "trust": 1.4, "url": "http://www.ubuntu.com/usn/usn-3430-1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14493" }, { "trust": 1.3, "url": "https://access.redhat.com/security/vulnerabilities/3199382" }, { "trust": 1.2, "url": "https://www.exploit-db.com/exploits/42943/" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-3430-2" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201710-27" }, { "trust": 1.1, "url": "http://thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1039474" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html" }, { "trust": 1.1, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4561" }, { "trust": 1.1, "url": "https://www.synology.com/support/security/synology_sa_17_59_dnsmasq" }, { "trust": 1.1, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2017-005.txt" }, { "trust": 1.1, "url": "http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commit%3bh=3d4ff1ba8419546490b464418223132529514033" }, { "trust": 1.1, "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html" }, { "trust": 1.1, "url": "https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14491" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14492" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14493" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2017-14494" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14495" }, { "trust": 1.0, "url": "https://access.redhat.com/security/cve/cve-2017-14496" }, { "trust": 0.9, "url": "http://www.thekelleys.org.uk/dnsmasq/changelog" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py" }, { "trust": 0.9, "url": "https://github.com/kubernetes/kubernetes/blob/master/changelog.md" }, { "trust": 0.9, "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2017\u0026m=slackware-security.601472" }, { "trust": 0.9, "url": "https://source.android.com/security/bulletin/2017-10-01" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495410" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495411" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495412" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495415" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495416" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495510" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2017-13704" }, { "trust": 0.9, "url": "https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py" }, { "trust": 0.9, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-332-01" }, { "trust": 0.8, "url": "https://www.ruckuswireless.com/security" }, { "trust": 0.8, "url": "https://www.zyxel.com/support/announcement_dnsmasq_vulnerabilities.shtml" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14493" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu93453933/index.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14491" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14494" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14492" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409bug1495409" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14496" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14495" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/pupiles/bof-dnsmasq-cve-2017-14493" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=55496" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1741262" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3430-3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.76-5ubuntu0.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/dnsmasq/2.68-1ubuntu0.2" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14495" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14491" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14496" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-14494" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#973527" }, { "db": "VULMON", "id": "CVE-2017-14493" }, { "db": "BID", "id": "101085" }, { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "PACKETSTORM", "id": "144490" }, { "db": "PACKETSTORM", "id": "144484" }, { "db": "PACKETSTORM", "id": "145652" }, { "db": "PACKETSTORM", "id": "144477" }, { "db": "PACKETSTORM", "id": "144469" }, { "db": "PACKETSTORM", "id": "144706" }, { "db": "NVD", "id": "CVE-2017-14493" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-02T00:00:00", "db": "CERT/CC", "id": "VU#973527" }, { "date": "2017-10-03T00:00:00", "db": "VULMON", "id": "CVE-2017-14493" }, { "date": "2017-10-02T00:00:00", "db": "BID", "id": "101085" }, { "date": "2017-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "date": "2017-10-03T20:21:00", "db": "PACKETSTORM", "id": "144490" }, { "date": "2017-10-03T05:19:24", "db": "PACKETSTORM", "id": "144484" }, { "date": "2018-01-04T17:50:40", "db": "PACKETSTORM", "id": "145652" }, { "date": "2017-10-02T11:11:00", "db": "PACKETSTORM", "id": "144477" }, { "date": "2017-10-02T13:13:00", "db": "PACKETSTORM", "id": "144469" }, { "date": "2017-10-23T13:54:05", "db": "PACKETSTORM", "id": "144706" }, { "date": "2017-10-03T01:29:02.077000", "db": "NVD", "id": "CVE-2017-14493" }, { "date": "2017-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-02-02T00:00:00", "db": "CERT/CC", "id": "VU#973527" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2017-14493" }, { "date": "2017-10-02T00:00:00", "db": "BID", "id": "101085" }, { "date": "2017-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "date": "2023-11-07T02:39:01.497000", "db": "NVD", "id": "CVE-2017-14493" }, { "date": "2019-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-745" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "dnsmasq Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-008620" }, { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-745" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.