Vulnerabilidad en dnsmasq (CVE-2017-14491)
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-787
Escritura fuera de límites
Fecha de publicación:
04/10/2017
Última modificación:
20/04/2025
Descripción
Un desbordamiento de búfer basado en memoria dinámica (heap) en dnsmasq en versiones anteriores a la 2.78 permite a los atacantes provocar una denegación de servicio (cierre inesperado) o ejecutar código arbitrario utilizando una respuesta DNS manipulada.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:* | 2.77 (incluyendo) | |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4560
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba%3Dcommit%3Bh%3D0549c73b7ea6b22a3c49beb4d432f185a81efcbc
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.debian.org/security/2017/dsa-3989
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en
- http://www.securityfocus.com/bid/101085
- http://www.securityfocus.com/bid/101977
- http://www.securitytracker.com/id/1039474
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-3
- https://access.redhat.com/errata/RHSA-2017:2836
- https://access.redhat.com/errata/RHSA-2017:2837
- https://access.redhat.com/errata/RHSA-2017:2838
- https://access.redhat.com/errata/RHSA-2017:2839
- https://access.redhat.com/errata/RHSA-2017:2840
- https://access.redhat.com/errata/RHSA-2017:2841
- https://access.redhat.com/security/vulnerabilities/3199382
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/
- https://security.gentoo.org/glsa/201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/
- https://www.debian.org/security/2017/dsa-3989
- https://www.exploit-db.com/exploits/42941/
- https://www.kb.cert.org/vuls/id/973527
- https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html
- https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
- http://nvidia.custhelp.com/app/answers/detail/a_id/4560
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba%3Dcommit%3Bh%3D0549c73b7ea6b22a3c49beb4d432f185a81efcbc
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.debian.org/security/2017/dsa-3989
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en
- http://www.securityfocus.com/bid/101085
- http://www.securityfocus.com/bid/101977
- http://www.securitytracker.com/id/1039474
- http://www.ubuntu.com/usn/USN-3430-1
- http://www.ubuntu.com/usn/USN-3430-2
- http://www.ubuntu.com/usn/USN-3430-3
- https://access.redhat.com/errata/RHSA-2017:2836
- https://access.redhat.com/errata/RHSA-2017:2837
- https://access.redhat.com/errata/RHSA-2017:2838
- https://access.redhat.com/errata/RHSA-2017:2839
- https://access.redhat.com/errata/RHSA-2017:2840
- https://access.redhat.com/errata/RHSA-2017:2841
- https://access.redhat.com/security/vulnerabilities/3199382
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/
- https://security.gentoo.org/glsa/201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
- https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/
- https://www.debian.org/security/2017/dsa-3989
- https://www.exploit-db.com/exploits/42941/
- https://www.kb.cert.org/vuls/id/973527
- https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html
- https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html
- https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq