Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html - Issue Tracking, Mailing List, Third Party Advisory | |
References | () http://nvidia.custhelp.com/app/answers/detail/a_id/4561 - Third Party Advisory | |
References | () http://thekelleys.org.uk/dnsmasq/CHANGELOG - Release Notes, Vendor Advisory | |
References | () http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=3d4ff1ba8419546490b464418223132529514033 - | |
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt - | |
References | () http://www.debian.org/security/2017/dsa-3989 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/101085 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039474 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-3430-1 - Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3430-2 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2836 - Patch, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:2837 - Patch, Third Party Advisory | |
References | () https://access.redhat.com/security/vulnerabilities/3199382 - Issue Tracking, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201710-27 - Third Party Advisory | |
References | () https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/42943/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.kb.cert.org/vuls/id/973527 - Third Party Advisory, US Government Resource | |
References | () https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html - | |
References | () https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html - | |
References | () https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq - Third Party Advisory |
07 Nov 2023, 02:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-10-03 01:29
Updated : 2024-11-21 03:12
NVD link : CVE-2017-14493
Mitre link : CVE-2017-14493
CVE.ORG link : CVE-2017-14493
JSON object : View
Products Affected
thekelleys
- dnsmasq
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer