Vulnerability Details : CVE-2017-14493
Potential exploit
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2017-14493
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
- cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*
Threat overview for CVE-2017-14493
Top countries where our scanners detected CVE-2017-14493
Top open port discovered on systems with this issue
53
IPs affected by CVE-2017-14493 815,769
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-14493!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-14493
5.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-14493
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-14493
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-14493
-
http://www.ubuntu.com/usn/USN-3430-2
USN-3430-2: Dnsmasq vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.debian.org/security/2017/dsa-3989
Debian -- Security Information -- DSA-3989-1 dnsmasqThird Party Advisory
-
https://security.gentoo.org/glsa/201710-27
Dnsmasq: Multiple vulnerabilities (GLSA 201710-27) — Gentoo securityThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
[security-announce] openSUSE-SU-2017:2633-1: important: Security updateIssue Tracking;Mailing List;Third Party Advisory
-
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=3d4ff1ba8419546490b464418223132529514033
thekelleys.org.uk Git - dnsmasq.git/commitVendor Advisory
-
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
-
https://www.kb.cert.org/vuls/id/973527
VU#973527 - Dnsmasq contains multiple vulnerabilitiesThird Party Advisory;US Government Resource
-
https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11664.html
[Dnsmasq-discuss] IMPORTANT SECURITY INFORMATION.Mailing List;Third Party Advisory
-
https://www.exploit-db.com/exploits/42943/
Dnsmasq < 2.78 - Stack OverflowExploit;Third Party Advisory;VDB Entry
-
https://access.redhat.com/security/vulnerabilities/3199382
dnsmasq: Multiple Critical and Important vulnerabilities - Red Hat Customer PortalIssue Tracking;Third Party Advisory
-
http://www.securityfocus.com/bid/101085
Dnsmasq VU#973527 Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Synology Inc.Third Party Advisory
-
http://www.securitytracker.com/id/1039474
Dnsmasq Multiple Flaws Let Remote Users Execute Arbitrary Code, Deny Service, and Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:2836
RHSA-2017:2836 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
-
https://www.mail-archive.com/dnsmasq-discuss@lists.thekelleys.org.uk/msg11665.html
[Dnsmasq-discuss] Announce: dnsmasq-2.78.Mailing List;Third Party Advisory
-
http://nvidia.custhelp.com/app/answers/detail/a_id/4561
Security Bulletin: NVIDIA Tegra Jetson L4T contains multiple vulnerabilities; updates for “BlueBorne” and “Dnsmasq”. | NVIDIAThird Party Advisory
-
http://thekelleys.org.uk/dnsmasq/CHANGELOG
Release Notes;Vendor Advisory
-
http://www.ubuntu.com/usn/USN-3430-1
USN-3430-1: Dnsmasq vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
Google Online Security Blog: Behind the Masq: Yet more DNS, and DHCP, vulnerabilitiesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:2837
RHSA-2017:2837 - Security Advisory - Red Hat Customer PortalPatch;Third Party Advisory
Jump to