Executive Summary
Summary | |
---|---|
Title | Dnsmasq is vulnerable to memory corruption and cache poisoning |
Informations | |||
---|---|---|---|
Name | VU#434904 | First vendor Publication | 2021-01-19 |
Vendor | VU-CERT | Last vendor Modification | 2021-07-20 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 8.1 | ||
Base Score | 8.1 | Environmental Score | 8.1 |
impact SubScore | 5.9 | Temporal Score | 8.1 |
Exploitabality Sub Score | 2.2 | ||
Attack Vector | Network | Attack Complexity | High |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:C) | |||
---|---|---|---|
Cvss Base Score | 8.3 | Attack Range | Network |
Cvss Impact Score | 8.5 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
OverviewDnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment. These vulnerabilities are also tracked as ICS-VU-668462 and referred to as DNSpooq. DescriptionDnsmasq is widely used open-source software that provides DNS forwarding and caching (and also a DHCP server). Dnsmasq is common in Internet-of-Things (IoT) and other embedded devices. JSOF reported multiple memory corruption vulnerabilities in dnsmasq due to boundary checking errors in DNSSEC handling code.
JSOF also reported vulnerabilities in DNS response validation that can result in DNS cache poisoning.
Note: These cache poisoning scenarios and defenses are discussed in IETF RFC5452. ImpactThe memory corruption vulnerabilities can be triggered by a remote attacker using crafted DNS responses that can lead to denial of service, information exposure, and potentially remote code execution. The DNS response validation vulnerabilities allow an attacker to use unsolicited DNS responses to poison the DNS cache and redirect users to arbitrary sites. SolutionApply updatesThese vulnerabilities are addressed in dnsmasq 2.83. Users of IoT and embedded devices that use dnsmasq should contact their vendors. Follow security best-practicesConsider the following security best-practices to protect DNS infrastructure:
AcknowledgementsMoshe Kol and Shlomi Oberman of JSOF researched and reported these vulnerabilities. Simon Kelley (author of dnsmasq) worked closely with collaborative vendors (Cisco, Google, Pi-Hole, Redhat) to develop patches to address these security vulnerabilities. GitHub also supported these collaboration efforts providing support to use their GitHub Security Advisory platform for collaboration. This document was written by Vijay Sarvepalli. |
Original Source
Url : https://kb.cert.org/vuls/id/434904 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-326 | Inadequate Encryption Strength |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2021-07-21 00:17:43 |
|
2021-06-02 21:18:00 |
|
2021-02-11 21:18:01 |
|
2021-02-08 21:17:59 |
|
2021-01-27 00:28:59 |
|
2021-01-22 21:17:59 |
|
2021-01-21 00:17:32 |
|
2021-01-20 17:17:34 |
|
2021-01-19 21:18:02 |
|