dnsmasq 2.25 allows remote attackers to cause a denial of service (daemon crash) by (1) renewing a nonexistent lease or (2) sending a DHCPREQUEST for an IP address that is not in the same network, related to the DHCP NAK response from the daemon.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://freshmeat.net/projects/dnsmasq/?branch_id=1991&release_id=217681 - | |
References | () http://www.openwall.com/lists/oss-security/2008/06/30/7 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/01/8 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/02/4 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/03/4 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/08/8 - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/12/3 - Exploit | |
References | () http://www.thekelleys.org.uk/dnsmasq/CHANGELOG - | |
References | () https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/47438 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43929 - |
Information
Published : 2008-07-18 16:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3214
Mitre link : CVE-2008-3214
CVE.ORG link : CVE-2008-3214
JSON object : View
Products Affected
thekelleys
- dnsmasq
CWE
CWE-20
Improper Input Validation