DNSmasq.extract_name.Out.of.Bounds.Write
Description
This indicates an attack attempt to exploit an Out of Bounds Write Vulnerability in Dnsmasq.
The vulnerability occurs while extracting domain name of a RR record using the extract_name() function while sorting multiple RR records. A remote, unauthenticated attacker can run a server to send a specially crafted DNS reply to a target server. Successful exploitation leads to denial-of-service conditions or in worst case arbitrary code execution with administrative privileges.
Affected Products
Dnsmasq Dnsmasq prior to 2.83
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014599.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |