Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown

CVE-2015-3294

Disclosure Date: May 08, 2015 (last updated October 05, 2023)
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
0
Attacker Value
Unknown

CVE-2012-3411

Disclosure Date: March 05, 2013 (last updated October 05, 2023)
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
0
Attacker Value
Unknown

CVE-2013-0198

Disclosure Date: March 05, 2013 (last updated November 08, 2023)
Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411.
0
Attacker Value
Unknown

CVE-2009-2958

Disclosure Date: September 02, 2009 (last updated October 04, 2023)
The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
0
Attacker Value
Unknown

CVE-2009-2957

Disclosure Date: September 02, 2009 (last updated October 04, 2023)
Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
0
Attacker Value
Unknown

CVE-2008-3214

Disclosure Date: July 18, 2008 (last updated October 04, 2023)
dnsmasq 2.25 allows remote attackers to cause a denial of service (daemon crash) by (1) renewing a nonexistent lease or (2) sending a DHCPREQUEST for an IP address that is not in the same network, related to the DHCP NAK response from the daemon.
0
Attacker Value
Unknown

CVE-2005-0877

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Dnsmasq before 2.21 allows remote attackers to poison the DNS cache via answers to queries that were not made by Dnsmasq.