Lucene search

K
gentooGentoo FoundationGLSA-202105-20
HistoryMay 26, 2021 - 12:00 a.m.

Dnsmasq: DNS cache poisoning

2021-05-2600:00:00
Gentoo Foundation
security.gentoo.org
32

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

0.002 Low

EPSS

Percentile

60.6%

Background

Dnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP server.

Description

It was discovered that Dnsmasq, when configured with --server=<address>@ or similar (e.g. through dbus), configured a fixed UDP port for all outgoing queries to the specified upstream DNS server.

Impact

An attacker, by sending malicious crafted DNS responses, could perform a DNS Cache Poisoning attack.

Workaround

There is no known workaround at this time.

Resolution

All Dnsmasq users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose "&gt;=net-dns/dnsmasq-2.85"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-dns/dnsmasq< 2.85UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

0.002 Low

EPSS

Percentile

60.6%