Lucene search

K
freebsdFreeBSD5B72B1FF-877C-11EB-BD4F-2F1D57DAFE46
HistoryMar 17, 2021 - 12:00 a.m.

dnsmasq -- cache poisoning vulnerability in certain configurations

2021-03-1700:00:00
vuxml.freebsd.org
14

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

0.002 Low

EPSS

Percentile

60.7%

Simon Kelley reports:

    [In configurations where the forwarding server address contains an @
    character for specifying a sending interface or source address, the]
    random source port behavior was disabled, making cache poisoning
    attacks possible.
  


  This only affects configurations of the form server=1.1.1.1@em0 or
  [email protected], i. e. those that specify an interface to
  send through, or an IP address to send from, or use together with
  NetworkManager.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchdnsmasq< 2.85.r1,1UNKNOWN
FreeBSDanynoarchdnsmasq-devel< 2.85.r1,3UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

0.002 Low

EPSS

Percentile

60.7%