Vulnerability Description
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 7.0 |
| Android | 4.4.4 | |
| Novell | Leap | 42.2 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Thekelleys | Dnsmasq | <= 2.77 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.htmlIssue TrackingMailing ListThird Party Advisory
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
- http://thekelleys.org.uk/dnsmasq/CHANGELOGRelease NotesVendor Advisory
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=897c113fda0886a28a
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
- http://www.debian.org/security/2017/dsa-3989Third Party Advisory
- http://www.securityfocus.com/bid/101085Third Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/101977
- http://www.securitytracker.com/id/1039474Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-3430-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-3430-2Third Party Advisory
- https://access.redhat.com/errata/RHSA-2017:2836PatchThird Party Advisory
- https://access.redhat.com/security/vulnerabilities/3199382Issue TrackingThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf
- https://security.gentoo.org/glsa/201710-27
FAQ
What is CVE-2017-14496?
CVE-2017-14496 is a vulnerability with a CVSS score of 7.5 (HIGH). Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service v...
How severe is CVE-2017-14496?
CVE-2017-14496 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14496?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Debian Debian Linux, Google Android, Novell Leap, Redhat Enterprise Linux Desktop.