First published: Sat Mar 26 2005(Updated: )
Off-by-one buffer overflow in Dnsmasq before 2.21 may allow attackers to execute arbitrary code via the DHCP lease file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
thekelleys Dnsmasq | =2.14 | |
thekelleys Dnsmasq | =2.15 | |
thekelleys Dnsmasq | =2.16 | |
thekelleys Dnsmasq | =2.17 | |
thekelleys Dnsmasq | =2.18 | |
thekelleys Dnsmasq | =2.19 | |
thekelleys Dnsmasq | =2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0876 has been classified as high severity due to its potential for arbitrary code execution.
To fix CVE-2005-0876, upgrade Dnsmasq to version 2.21 or later.
CVE-2005-0876 affects Dnsmasq versions 2.14 to 2.20, inclusive.
Yes, CVE-2005-0876 can be exploited remotely if an attacker has access to the DHCP lease file.
CVE-2005-0876 is an off-by-one buffer overflow vulnerability.