Vulnerability Details : CVE-2021-3448
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Products affected by CVE-2021-3448
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- Oracle » Communications Cloud Native Core Network Function Cloud Native Environment » Version: 1.9.0cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*
Threat overview for CVE-2021-3448
Top countries where our scanners detected CVE-2021-3448
Top open port discovered on systems with this issue
53
IPs affected by CVE-2021-3448 1,134,013
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2021-3448!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2021-3448
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3448
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
4.0
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N |
2.2
|
1.4
|
NIST |
CWE ids for CVE-2021-3448
-
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.Assigned by: secalert@redhat.com (Secondary)
References for CVE-2021-3448
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVTJUOFFFHINLKWAOC2ZSC5MOPD4SJ24/
[SECURITY] Fedora 34 Update: dnsmasq-2.85-1.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://www.oracle.com/security-alerts/cpujan2022.html
Oracle Critical Patch Update Advisory - January 2022Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FHG7GWSQWKF7JXIMLOGJBKZWBB4VIAJ7/
[SECURITY] Fedora 32 Update: dnsmasq-2.85-1.fc32 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1939368
1939368 – (CVE-2021-3448) CVE-2021-3448 dnsmasq: fixed outgoing port used when --server is used with an interface nameExploit;Issue Tracking;Patch;Third Party Advisory
-
https://security.gentoo.org/glsa/202105-20
Dnsmasq: DNS cache poisoning (GLSA 202105-20) — Gentoo securityThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHURNEHHUBSW45KMIZ4FNBCSUPWPGV5V/
[SECURITY] Fedora 33 Update: dnsmasq-2.85-1.fc33 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to