CVE-2020-25687
Summary
| CVE | CVE-2020-25687 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-01-20 17:15:00 UTC |
| Updated | 2023-11-07 03:20:00 UTC |
| Description | A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. This flaw allows a remote attacker, who can create valid DNS replies, to cause an overflow in a heap-allocated memory. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset() and cause a crash in dnsmasq, resulting in a denial of service. The highest threat from this vulnerability is to system availability. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 33 Update: dnsmasq-2.83-1.fc33 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Third Party Advisory |
| [SECURITY] [DLA 2604-1] dnsmasq security update |
MLIST |
lists.debian.org |
|
| [SECURITY] Fedora 32 Update: dnsmasq-2.84-1.fc32 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Mailing List, Third Party Advisory |
| [SECURITY] Fedora 33 Update: dnsmasq-2.83-1.fc33 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| 1891568 – (CVE-2020-25687) CVE-2020-25687 dnsmasq: heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled |
MISC |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| [SECURITY] Fedora 32 Update: dnsmasq-2.84-1.fc32 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Dnsmasq: Multiple vulnerabilities (GLSA 202101-17) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| DNSPOOQ - JSOF |
MISC |
www.jsof-tech.com |
Third Party Advisory |
| Debian -- Security Information -- DSA-4844-1 dnsmasq |
DEBIAN |
www.debian.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 178499 Debian Security Update for dnsmasq (DLA 2604-1)
- 296069 Oracle Solaris 11.4 Support Repository Update (SRU) 31.88.5 Missing (CPUJAN2021)
- 377140 Alibaba Cloud Linux Security Update for dnsmasq (ALINUX3-SA-2021:0009)
- 500150 Alpine Linux Security Update for dnsmasq
- 503800 Alpine Linux Security Update for dnsmasq
- 670173 EulerOS Security Update for dnsmasq (EulerOS-SA-2021-1673)
- 690442 Free Berkeley Software Distribution (FreeBSD) Security Update for dnsmasq (5b5cf6e5-5b51-11eb-95ac-7f9491278677)
- 750407 OpenSUSE Security Update for dnsmasq (openSUSE-SU-2021:0129-1)
- 750409 OpenSUSE Security Update for dnsmasq (openSUSE-SU-2021:0124-1)
- 900068 CBL-Mariner Linux Security Update for dnsmasq 2.79
- 903576 Common Base Linux Mariner (CBL-Mariner) Security Update for dnsmasq (3790)
- 940396 AlmaLinux Security Update for dnsmasq (ALSA-2021:0150)