CVE-2017-14495
Dnsmasq < 2.78 - Lack of free() Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Memory leak in dnsmasq before 2.78, when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service (memory consumption) via vectors involving DNS response creation.
Una fuga de memoria en las versiones anteriores a la 2.78 de dnsmasq, cuando están especificadas las opciones --add-mac, --add-cpe-id o --add-subnet, permite que los atacantes remotos provoquen una denegación de servicio (consumo de memoria) mediante vectores relacionados con la creación de respuestas DNS.
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.
Dnsmasq versions prior to 2.78 suffer from a lack of free() denial of service vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-09-15 CVE Reserved
- 2017-10-02 CVE Published
- 2024-01-06 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
References (23)
URL | Tag | Source |
---|---|---|
http://nvidia.custhelp.com/app/answers/detail/a_id/4561 | X_refsource_confirm | |
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=51eadb692a5123b9838e5a68ecace3ac579a3a45 | X_refsource_confirm | |
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt | X_refsource_confirm | |
http://www.securityfocus.com/bid/101085 | Third Party Advisory | |
http://www.securityfocus.com/bid/101977 | Vdb Entry | |
http://www.securitytracker.com/id/1039474 | Third Party Advisory | |
https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf | X_refsource_confirm | |
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html | Third Party Advisory | |
https://www.kb.cert.org/vuls/id/973527 | Third Party Advisory | |
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html | Mailing List | |
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html | Mailing List | |
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/42945 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:2836 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html | 2023-11-07 | |
http://thekelleys.org.uk/dnsmasq/CHANGELOG | 2023-11-07 | |
http://www.debian.org/security/2017/dsa-3989 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-3430-1 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-3430-2 | 2023-11-07 | |
https://access.redhat.com/security/vulnerabilities/3199382 | 2017-10-02 | |
https://security.gentoo.org/glsa/201710-27 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2017-14495 | 2017-10-02 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1495415 | 2017-10-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 17.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "17.04" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.1 Search vendor "Debian" for product "Debian Linux" and version "7.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Leap Search vendor "Novell" for product "Leap" | 42.2 Search vendor "Novell" for product "Leap" and version "42.2" | - |
Safe
| ||||||
Novell Search vendor "Novell" | Leap Search vendor "Novell" for product "Leap" | 42.3 Search vendor "Novell" for product "Leap" and version "42.3" | - |
Safe
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0" | - |
Affected
| ||||||
Thekelleys Search vendor "Thekelleys" | Dnsmasq Search vendor "Thekelleys" for product "Dnsmasq" | <= 2.77 Search vendor "Thekelleys" for product "Dnsmasq" and version " <= 2.77" | - |
Affected
|