8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
0.109 Low
EPSS
Percentile
95.0%
A flaw was found in dnsmasq before 2.83. A buffer overflow vulnerability
was discovered in the way dnsmasq extract names from DNS packets before
validating them with DNSSEC data. An attacker on the network, who can
create valid DNS replies, could use this flaw to cause an overflow with
arbitrary data in a heap-allocated memory, possibly executing code on the
machine. The flaw is in the rfc1035.c:extract_name() function, which writes
data to the memory pointed by name assuming MAXDNAME*2 bytes are available
in the buffer. However, in some code execution paths, it is possible
extract_name() gets passed an offset from the base buffer, thus reducing,
in practice, the number of available bytes that can be written in the
buffer. The highest threat from this vulnerability is to data
confidentiality and integrity as well as system availability.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | dnsmasq | < 2.79-1ubuntu0.2 | UNKNOWN |
ubuntu | 20.04 | noarch | dnsmasq | < 2.80-1.1ubuntu1.2 | UNKNOWN |
ubuntu | 20.10 | noarch | dnsmasq | < 2.82-1ubuntu1.1 | UNKNOWN |
ubuntu | 21.04 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
ubuntu | 21.10 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
ubuntu | 22.04 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
ubuntu | 22.10 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
ubuntu | 23.04 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
ubuntu | 23.10 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
ubuntu | 24.04 | noarch | dnsmasq | < 2.82-1ubuntu2 | UNKNOWN |
lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014599.html
launchpad.net/bugs/cve/CVE-2020-25682
nvd.nist.gov/vuln/detail/CVE-2020-25682
security-tracker.debian.org/tracker/CVE-2020-25682
ubuntu.com/security/notices/USN-4698-1
www.cve.org/CVERecord?id=CVE-2020-25682
www.jsof-tech.com/disclosures/dnspooq/
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:P/I:P/A:C
0.109 Low
EPSS
Percentile
95.0%