CVE-2020-25684
Summary
| CVE | CVE-2020-25684 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-20 16:15:00 UTC |
| Updated | 2023-11-07 03:20:00 UTC |
| Description | A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Arista | Eos | All | All | All | All |
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 32 | All | All | All |
| Operating System | Fedoraproject | Fedora | 33 | All | All | All |
| Operating System | Fedoraproject | Fedora | 32 | All | All | All |
| Operating System | Fedoraproject | Fedora | 33 | All | All | All |
| Application | Thekelleys | Dnsmasq | All | All | All | All |
| Application | Thekelleys | Dnsmasq | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 33 Update: dnsmasq-2.83-1.fc33 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| Security Advisory 0061 - Arista | MISC | www.arista.com | |
| [SECURITY] [DLA 2604-1] dnsmasq security update | MLIST | lists.debian.org | |
| [SECURITY] Fedora 32 Update: dnsmasq-2.84-1.fc32 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| [SECURITY] Fedora 33 Update: dnsmasq-2.83-1.fc33 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] Fedora 32 Update: dnsmasq-2.84-1.fc32 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| 1889686 – (CVE-2020-25684) CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker | MISC | bugzilla.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| Dnsmasq: Multiple vulnerabilities (GLSA 202101-17) — Gentoo security | GENTOO | security.gentoo.org | Third Party Advisory |
| DNSPOOQ - JSOF | MISC | www.jsof-tech.com | Third Party Advisory |
| Debian -- Security Information -- DSA-4844-1 dnsmasq | DEBIAN | www.debian.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178499 Debian Security Update for dnsmasq (DLA 2604-1)
- 296069 Oracle Solaris 11.4 Support Repository Update (SRU) 31.88.5 Missing (CPUJAN2021)
- 352293 Amazon Linux Security Update for dnsmasq: AL2012-2021-334
- 377140 Alibaba Cloud Linux Security Update for dnsmasq (ALINUX3-SA-2021:0009)
- 377442 Alibaba Cloud Linux Security Update for dnsmasq (ALINUX2-SA-2021:0002)
- 43821 Arista EOS Domain Name System (DNS) cache poisoning Vulnerability (SA0061)
- 500150 Alpine Linux Security Update for dnsmasq
- 503800 Alpine Linux Security Update for dnsmasq
- 670173 EulerOS Security Update for dnsmasq (EulerOS-SA-2021-1673)
- 670301 EulerOS Security Update for dnsmasq (EulerOS-SA-2021-1775)
- 690442 Free Berkeley Software Distribution (FreeBSD) Security Update for dnsmasq (5b5cf6e5-5b51-11eb-95ac-7f9491278677)
- 730121 McAfee Web Gateway Multiple Vulnerabilities (WP-3484,WP-3744,WP-3745,WP-3746,WP-3747,WP-3793,WP-3800)
- 750407 OpenSUSE Security Update for dnsmasq (openSUSE-SU-2021:0129-1)
- 750409 OpenSUSE Security Update for dnsmasq (openSUSE-SU-2021:0124-1)
- 900068 CBL-Mariner Linux Security Update for dnsmasq 2.79
- 903703 Common Base Linux Mariner (CBL-Mariner) Security Update for dnsmasq (3814)
- 940396 AlmaLinux Security Update for dnsmasq (ALSA-2021:0150)