Page 8 of 39 results (0.004 seconds)

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 2

dnsmasq 2.25 allows remote attackers to cause a denial of service (daemon crash) by (1) renewing a nonexistent lease or (2) sending a DHCPREQUEST for an IP address that is not in the same network, related to the DHCP NAK response from the daemon. dnsmasq versión 2.25, permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) al (1) renovar una concesión inexistente o (2) enviar un DHCPREQUEST para una dirección IP que no está en la misma red, relacionada con la respuesta NAK DHCP del demonio. • http://freshmeat.net/projects/dnsmasq/?branch_id=1991&release_id=217681 http://www.openwall.com/lists/oss-security/2008/06/30/7 http://www.openwall.com/lists/oss-security/2008/07/01/8 http://www.openwall.com/lists/oss-security/2008/07/02/4 http://www.openwall.com/lists/oss-security/2008/07/03/4 http://www.openwall.com/lists/oss-security/2008/07/08/8 http://www.openwall.com/lists/oss-security/2008/07/12/3 http://www.thekelleys.org.uk/dnsmasq • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Dnsmasq 2.29 allows remote attackers to cause a denial of service (application crash) via a DHCP client broadcast reply request. • http://secunia.com/advisories/19760 http://thekelleys.org.uk/dnsmasq/CHANGELOG http://www.osvdb.org/24884 http://www.securityfocus.com/bid/17662 http://www.vupen.com/english/advisories/2006/1494 https://exchange.xforce.ibmcloud.com/vulnerabilities/26005 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Dnsmasq before 2.21 allows remote attackers to poison the DNS cache via answers to queries that were not made by Dnsmasq. • http://secunia.com/advisories/14691 http://www.securityfocus.com/bid/12897 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG https://exchange.xforce.ibmcloud.com/vulnerabilities/19826 • CWE-346: Origin Validation Error •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Off-by-one buffer overflow in Dnsmasq before 2.21 may allow attackers to execute arbitrary code via the DHCP lease file. • http://secunia.com/advisories/14691 http://www.securityfocus.com/bid/12897 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG https://exchange.xforce.ibmcloud.com/vulnerabilities/19825 •