CVE-2017-14492
Dnsmasq < 2.78 - Heap Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
Un desbordamiento de búfer basado en memoria dinámica (heap) en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegación de servicio (cierre inesperado) o ejecutar código arbitrario mediante una petición manipulada de anuncio de router IPv6.
A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra-names, ra-advrouter, or ra-stateless.
Dnsmasq versions prior to 2.78 suffers from a heap-based overflow vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-09-15 CVE Reserved
- 2017-10-02 CVE Published
- 2024-01-06 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://nvidia.custhelp.com/app/answers/detail/a_id/4561 | X_refsource_confirm | |
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=24036ea507862c7b7898b68289c8130f85599c10 | X_refsource_confirm | |
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt | X_refsource_confirm | |
http://www.securityfocus.com/bid/101085 | Third Party Advisory | |
http://www.securitytracker.com/id/1039474 | Third Party Advisory | |
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html | Third Party Advisory | |
https://www.kb.cert.org/vuls/id/973527 | Third Party Advisory | |
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html | Mailing List | |
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html | Mailing List | |
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/42942 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:2836 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2017:2837 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html | 2023-11-07 | |
http://thekelleys.org.uk/dnsmasq/CHANGELOG | 2023-11-07 | |
http://www.debian.org/security/2017/dsa-3989 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-3430-1 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-3430-2 | 2023-11-07 | |
https://access.redhat.com/security/vulnerabilities/3199382 | 2017-10-02 | |
https://security.gentoo.org/glsa/201710-27 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2017-14492 | 2017-10-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1495410 | 2017-10-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 17.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "17.04" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.1 Search vendor "Debian" for product "Debian Linux" and version "7.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Leap Search vendor "Novell" for product "Leap" | 42.2 Search vendor "Novell" for product "Leap" and version "42.2" | - |
Safe
| ||||||
Novell Search vendor "Novell" | Leap Search vendor "Novell" for product "Leap" | 42.3 Search vendor "Novell" for product "Leap" and version "42.3" | - |
Safe
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0" | - |
Affected
| ||||||
Thekelleys Search vendor "Thekelleys" | Dnsmasq Search vendor "Thekelleys" for product "Dnsmasq" | <= 2.77 Search vendor "Thekelleys" for product "Dnsmasq" and version " <= 2.77" | - |
Affected
|