Vulnerability Description
Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (called from check_for_bogus_wildcard and FuzzCheckForBogusWildcard). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thekelleys | Dnsmasq | 2.86 |
Related Weaknesses (CWE)
References
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35868ExploitIssue TrackingThird Party Advisory
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-924.yaThird Party Advisory
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.htmlMailing ListThird Party Advisory
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.htmlMailing ListThird Party Advisory
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35868ExploitIssue TrackingThird Party Advisory
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-924.yaThird Party Advisory
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.htmlMailing ListThird Party Advisory
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2021-45951?
CVE-2021-45951 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Dnsmasq 2.86 has a heap-based buffer overflow in check_bad_address (called from check_for_bogus_wildcard and FuzzCheckForBogusWildcard). NOTE: the vendor's position is that CVE-2021-45951 through CVE-...
How severe is CVE-2021-45951?
CVE-2021-45951 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-45951?
Check the references section above for vendor advisories and patch information. Affected products include: Thekelleys Dnsmasq.