[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3251-1 dnsmasq -- dnsmasq

ID: oval:org.secpod.oval:def:602069Date: (C)2015-05-11   (M)2023-11-13
Class: PATCHFamily: unix




Nick Sampanis discovered that dnsmasq, a small caching DNS proxy and DHCP/TFTP server, did not properly check the return value of the setup_reply function called during a TCP connection, which is used then as a size argument in a function which writes data on the client"s connection. A remote attacker could exploit this issue via a specially crafted DNS request to cause dnsmasq to crash, or potentially to obtain sensitive information from process memory.

Platform:
Debian 8.x
Debian 7.x
Product:
dnsmasq
Reference:
DSA-3251-1
CVE-2015-3294
CVE    1
CVE-2015-3294
CPE    3
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
cpe:/a:thekelleys:dnsmasq

© SecPod Technologies