漏洞标题
N/A
漏洞描述信息
在2.83之前,dnsmasq发现了一个漏洞。在dnsmasq使用从DNS packets中提取名称之前,通过使用DNSSEC数据验证它们的方式,发现了缓冲区溢出漏洞。在网络中攻击者,能够创建合法DNS响应,可以利用此漏洞在堆内存分配的内存中以任意数据溢出,可能执行机器上的代码。漏洞存在于 RFC1035.c:extract_name()函数中,该函数假定缓冲区中 MAXDNAME*2 字节可用,将数据写入由名称指向的内存。然而,在某些代码执行路径中,可能从基缓冲区传递一个偏移量,从而降低实际可写入的缓冲区字节数。此漏洞对数据保密性和完整性以及系统可用性的最大威胁。
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker on the network, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in the rfc1035.c:extract_name() function, which writes data to the memory pointed by name assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths, it is possible extract_name() gets passed an offset from the base buffer, thus reducing, in practice, the number of available bytes that can be written in the buffer. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS信息
N/A
漏洞类别
堆缓冲区溢出
漏洞标题
Dnsmasq 缓冲区错误漏洞
漏洞描述信息
Dnsmasq是一款使用C语言编写的轻量级DNS转发和DHCP、TFTP服务器。 Dnsmasq 存在缓冲区错误漏洞,该漏洞源于在用DNSSEC数据验证DNS包之前,dnsmasq从DNS包中提取名称的方式存在缓冲区溢出漏洞。
CVSS信息
N/A
漏洞类别
缓冲区错误