Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2021-3448
Description:A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Test IDs: 1.3.6.1.4.1.25623.1.0.879439   1.3.6.1.4.1.25623.1.0.879430   1.3.6.1.4.1.25623.1.0.879415   1.3.6.1.4.1.25623.1.0.117320   1.3.6.1.4.1.25623.1.0.117321   1.3.6.1.4.1.25623.1.0.844963   1.3.6.1.4.1.25623.1.1.2.2021.2189   1.3.6.1.4.1.25623.1.1.2.2021.2268   1.3.6.1.4.1.25623.1.1.2.2021.2242   1.3.6.1.4.1.25623.1.1.2.2021.2458   1.3.6.1.4.1.25623.1.1.2.2021.2199  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2021-3448
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVTJUOFFFHINLKWAOC2ZSC5MOPD4SJ24/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHURNEHHUBSW45KMIZ4FNBCSUPWPGV5V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHG7GWSQWKF7JXIMLOGJBKZWBB4VIAJ7/
https://security.gentoo.org/glsa/202105-20
https://bugzilla.redhat.com/show_bug.cgi?id=1939368
https://bugzilla.redhat.com/show_bug.cgi?id=1939368




© 1998-2024 E-Soft Inc. All rights reserved.