Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
References
Configurations
History
21 Nov 2024, 02:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html - | |
References | () http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html - | |
References | () http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87 - | |
References | () http://www.openwall.com/lists/oss-security/2016/06/03/7 - | |
References | () http://www.openwall.com/lists/oss-security/2016/06/04/2 - | |
References | () http://www.securityfocus.com/bid/91031 - | |
References | () http://www.securitytracker.com/id/1036045 - | |
References | () http://www.ubuntu.com/usn/USN-3009-1 - |
07 Nov 2023, 02:28
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-06-30 17:59
Updated : 2024-11-21 02:39
NVD link : CVE-2015-8899
Mitre link : CVE-2015-8899
CVE.ORG link : CVE-2015-8899
JSON object : View
Products Affected
thekelleys
- dnsmasq
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation