7.8

CVE-2017-14496

Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version17.04
DebianDebian Linux Version7.0
DebianDebian Linux Version7.1
DebianDebian Linux Version9.0
GoogleAndroid Version4.4.4
GoogleAndroid Version5.0.2
GoogleAndroid Version5.1.1
GoogleAndroid Version6.0
GoogleAndroid Version6.0.1
GoogleAndroid Version7.0
GoogleAndroid Version7.1.1
GoogleAndroid Version7.1.2
GoogleAndroid Version8.0
NovellLeap Version42.2
NovellLeap Version42.3
ThekelleysDnsmasq Version <= 2.77
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 15.74% 0.945
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-191 Integer Underflow (Wrap or Wraparound)

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.

http://thekelleys.org.uk/dnsmasq/CHANGELOG
Vendor Advisory
Release Notes
http://www.securityfocus.com/bid/101085
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039474
Third Party Advisory
VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
Third Party Advisory
Mailing List
Issue Tracking
https://www.kb.cert.org/vuls/id/973527
Third Party Advisory
US Government Resource
https://www.exploit-db.com/exploits/42946/
Third Party Advisory
VDB Entry