Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2018.3430.3
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-3430-3)
Summary:The remote host is missing an update for the 'dnsmasq' package(s) announced via the USN-3430-3 advisory.
Description:Summary:
The remote host is missing an update for the 'dnsmasq' package(s) announced via the USN-3430-3 advisory.

Vulnerability Insight:
USN-3430-2 fixed several vulnerabilities. The update introduced a new
regression that breaks DNS resolution. This update addresses the problem.

We apologize for the inconvenience.

Original advisory details:

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker
could use this issue to cause Dnsmasq to crash, resulting in a denial of
service, or possibly execute arbitrary code. (CVE-2017-14491)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled IPv6 router advertisements. A
remote attacker could use this issue to cause Dnsmasq to crash, resulting
in a denial of service, or possibly execute arbitrary code.
(CVE-2017-14492)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DHCPv6 requests. A remote
attacker could use this issue to cause Dnsmasq to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2017-14493)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DHCPv6 packets. A remote
attacker could use this issue to possibly obtain sensitive memory contents.
(CVE-2017-14494)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker
could use this issue to cause Dnsmasq to consume memory, resulting in a
denial of service. (CVE-2017-14495)

Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. A remote attacker
could use this issue to cause Dnsmasq to crash, resulting in a denial of
service. (CVE-2017-14496)

Affected Software/OS:
'dnsmasq' package(s) on Ubuntu 12.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-14491
BugTraq ID: 101085
http://www.securityfocus.com/bid/101085
BugTraq ID: 101977
http://www.securityfocus.com/bid/101977
CERT/CC vulnerability note: VU#973527
https://www.kb.cert.org/vuls/id/973527
Debian Security Information: DSA-3989 (Google Search)
http://www.debian.org/security/2017/dsa-3989
https://www.debian.org/security/2017/dsa-3989
https://www.exploit-db.com/exploits/42941/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/
https://security.gentoo.org/glsa/201710-27
http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30
https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
RedHat Security Advisories: RHSA-2017:2836
https://access.redhat.com/errata/RHSA-2017:2836
RedHat Security Advisories: RHSA-2017:2837
https://access.redhat.com/errata/RHSA-2017:2837
RedHat Security Advisories: RHSA-2017:2838
https://access.redhat.com/errata/RHSA-2017:2838
RedHat Security Advisories: RHSA-2017:2839
https://access.redhat.com/errata/RHSA-2017:2839
RedHat Security Advisories: RHSA-2017:2840
https://access.redhat.com/errata/RHSA-2017:2840
RedHat Security Advisories: RHSA-2017:2841
https://access.redhat.com/errata/RHSA-2017:2841
http://www.securitytracker.com/id/1039474
SuSE Security Announcement: SUSE-SU-2017:2616 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html
SuSE Security Announcement: SUSE-SU-2017:2617 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html
SuSE Security Announcement: SUSE-SU-2017:2619 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html
SuSE Security Announcement: openSUSE-SU-2017:2633 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
http://www.ubuntu.com/usn/USN-3430-1
http://www.ubuntu.com/usn/USN-3430-2
http://www.ubuntu.com/usn/USN-3430-3
Common Vulnerability Exposure (CVE) ID: CVE-2017-14492
https://www.exploit-db.com/exploits/42942/
Common Vulnerability Exposure (CVE) ID: CVE-2017-14493
https://www.exploit-db.com/exploits/42943/
Common Vulnerability Exposure (CVE) ID: CVE-2017-14494
https://www.exploit-db.com/exploits/42944/
Common Vulnerability Exposure (CVE) ID: CVE-2017-14495
https://www.exploit-db.com/exploits/42945/
Common Vulnerability Exposure (CVE) ID: CVE-2017-14496
https://www.exploit-db.com/exploits/42946/
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.