A buffer overflow flaw in dnsmasq before 2.83 allows arbitrary code execution via malicious DNS replies, posing a threat to data confidentiality, integrity, and system availability
Reporter | Title | Published | Views | Family All 129 |
---|---|---|---|---|
![]() | CVE-2020-25682 | 20 Jan 202116:28 | – | cvelist |
![]() | CVE-2020-25682 | 19 Jan 202112:18 | – | redhatcve |
![]() | DNSmasq Out-of-Bounds Write (CVE-2020-25682) | 20 Sep 202200:00 | – | checkpoint_advisories |
![]() | Buffer overflow | 20 Jan 202117:15 | – | prion |
![]() | Arbitrary Code Execution | 20 Jan 202116:41 | – | veracode |
![]() | CVE-2020-25682 | 20 Jan 202117:15 | – | alpinelinux |
![]() | CVE-2020-25682 | 20 Jan 202117:15 | – | osv |
![]() | dnsmasq - security update | 22 Mar 202100:00 | – | osv |
![]() | RHSA-2021:0151 Red Hat Security Advisory: dnsmasq security update | 29 Sep 202417:51 | – | osv |
![]() | RHSA-2021:0152 Red Hat Security Advisory: dnsmasq security update | 29 Sep 202417:51 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | dnsmasq | any | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo