Errata ID | 211 |
---|---|
Date | 2017-11-08 |
Source package | dnsmasq |
Fixed in version | 2.72-3+deb8u2 |
Description | This update addresses the following issues: * Crash on receipt of certain malformed DNS requests (CVE-2015-3294) * Heap-based buffer overflow allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response (CVE-2017-14491) * Heap-based buffer overflow allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request (CVE-2017-14492) * Stack-based buffer overflow allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. (CVE-2017-14493) * When configured as a relay, dnsmasq allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests (CVE-2017-14494) |
Additional notes | |
CVE ID | CVE-2015-3294 CVE-2017-14491 CVE-2017-14492 CVE-2017-14493 CVE-2017-14494 |
UCS Bug number | #45617 |