CVE-2020-25686
dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in dnsmasq before version 2.83. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
Se encontró un fallo en dnsmasq versiones anteriores a 2.83. Al recibir una consulta, dnsmasq no comprueba si existe una petición pendiente existente para el mismo nombre y reenvía una nueva petición. Por defecto, se puede enviar un máximo de 150 consultas pendientes a los servidores aguas arriba, por lo que puede haber como máximo 150 consultas para el mismo nombre. Este fallo permite a un atacante fuera de ruta en la red reduzca sustancialmente el número de intentos que tendría que realizar para falsificar una respuesta y hacer que dnsmasq la acepte. Este problema se menciona en la sección "Birthday Attacks" de RFC5452. Si se encadenaba con CVE-2020-25684, se reduce la complejidad del ataque de un ataque con éxito. La mayor amenaza de esta vulnerabilidad es la integridad de los datos
A flaw was found in dnsmasq. When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of 150 pending queries can be sent to upstream servers, so there can be at most 150 queries for the same name. This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. This issue is mentioned in the "Birthday Attacks" section of RFC5452. If chained with CVE-2020-25684, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-16 CVE Reserved
- 2021-01-19 CVE Published
- 2024-08-04 CVE Updated
- 2024-11-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-290: Authentication Bypass by Spoofing
- CWE-358: Improperly Implemented Security Check for Standard
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61 | Third Party Advisory | |
https://www.jsof-tech.com/disclosures/dnspooq | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1890125 | 2021-02-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Thekelleys Search vendor "Thekelleys" | Dnsmasq Search vendor "Thekelleys" for product "Dnsmasq" | < 2.83 Search vendor "Thekelleys" for product "Dnsmasq" and version " < 2.83" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Arista Search vendor "Arista" | Eos Search vendor "Arista" for product "Eos" | >= 4.21 < 4.21.14m Search vendor "Arista" for product "Eos" and version " >= 4.21 < 4.21.14m" | - |
Affected
| ||||||
Arista Search vendor "Arista" | Eos Search vendor "Arista" for product "Eos" | >= 4.22 < 4.22.9m Search vendor "Arista" for product "Eos" and version " >= 4.22 < 4.22.9m" | - |
Affected
| ||||||
Arista Search vendor "Arista" | Eos Search vendor "Arista" for product "Eos" | >= 4.23 < 4.23.7m Search vendor "Arista" for product "Eos" and version " >= 4.23 < 4.23.7m" | - |
Affected
| ||||||
Arista Search vendor "Arista" | Eos Search vendor "Arista" for product "Eos" | >= 4.24 < 4.24.5m Search vendor "Arista" for product "Eos" and version " >= 4.24 < 4.24.5m" | - |
Affected
| ||||||
Arista Search vendor "Arista" | Eos Search vendor "Arista" for product "Eos" | >= 4.25 < 4.25.2f Search vendor "Arista" for product "Eos" and version " >= 4.25 < 4.25.2f" | - |
Affected
|