Vulnerability Description
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 7.0 |
| Novell | Leap | 42.2 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Thekelleys | Dnsmasq | <= 2.77 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.htmlIssue TrackingMailing ListThird Party Advisory
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOGRelease NotesVendor Advisory
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=24036ea507862c7b78
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.debian.org/security/2017/dsa-3989Third Party Advisory
- http://www.securityfocus.com/bid/101085Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1039474Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3430-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3430-2Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2836PatchThird Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2837PatchThird Party Advisory
- https://access.redhat.com/security/vulnerabilities/3199382Issue TrackingThird Party Advisory
- https://security.gentoo.org/glsa/201710-27
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.htmlThird Party Advisory
FAQ
What is CVE-2017-14492?
CVE-2017-14492 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
How severe is CVE-2017-14492?
CVE-2017-14492 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14492?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Debian Linux, Novell Leap, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.