First published: Tue Sep 26 2017(Updated: )
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/dnsmasq | 2.80-1+deb10u1 2.85-1 2.89-1 | |
redhat/dnsmasq | <2.78 | 2.78 |
Android | ||
dnsmasq | <=2.77 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu | =12.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.04 | |
Debian | =7.0 | |
Debian | =7.1 | |
Debian | =8.0 | |
Debian | =9.0 | |
openSUSE | =42.2 | |
openSUSE | =42.3 | |
SUSE Linux Enterprise Debuginfo | =11-sp3 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
SUSE Linux Enterprise Point of Sale | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp4 | |
SUSE Linux Enterprise Server | =12 | |
All of | ||
NVIDIA Linux for Tegra | <r21.6 | |
NVIDIA Jetson TK1 | ||
All of | ||
NVIDIA Linux for Tegra | <r24.2.2 | |
NVIDIA Jetson TX1 L4T | ||
All of | ||
NVIDIA GeForce Experience | >=3.0<3.10.0.55 | |
Microsoft Windows | ||
All of | ||
Huawei Honor V9 Play Firmware | <jimmy-al00ac00b135 | |
Huawei Honor V9 Play Firmware | ||
Arista EOS | <=4.15 | |
Arista EOS | >=4.16<4.16.13m | |
Arista EOS | >=4.17<4.17.8m | |
Arista EOS | >=4.18<=4.18.4.2f | |
All of | ||
Siemens Ruggedcom RM1224 LTE (4G) NAM | <5.0 | |
Siemens Ruggedcom RM1224 LTE(4G) EU | ||
All of | ||
Siemens Scalance M-800 Firmware | <5.0 | |
Siemens Scalance M-800 Firmware | ||
All of | ||
Siemens Scalance S615 Firmware | <5.0 | |
Siemens SCALANCE S615 firmware | ||
All of | ||
Siemens SCALANCE W1750D | <6.5.1.5 | |
Siemens Scalance W1750D Firmware | ||
ArubaOS | >=6.3.1<6.3.1.25 | |
ArubaOS | >=6.4.4.0<6.4.4.16 | |
ArubaOS | >=6.5.0.0<6.5.1.9 | |
ArubaOS | >=6.5.3.0<6.5.3.3 | |
ArubaOS | >=6.5.4.0<6.5.4.2 | |
ArubaOS | >=8.1.0.0<8.1.0.4 | |
Synology Router Manager | =1.1 | |
Synology DiskStation Manager | =5.2 | |
Synology DiskStation Manager | =6.0 | |
Synology DiskStation Manager | =6.1 | |
NVIDIA Linux for Tegra | <r21.6 | |
NVIDIA Jetson TK1 | ||
NVIDIA Linux for Tegra | <r24.2.2 | |
NVIDIA Jetson TX1 L4T | ||
NVIDIA GeForce Experience | >=3.0<3.10.0.55 | |
Microsoft Windows | ||
Huawei Honor V9 Play Firmware | <jimmy-al00ac00b135 | |
Huawei Honor V9 Play Firmware | ||
Siemens Ruggedcom RM1224 LTE (4G) NAM | <5.0 | |
Siemens Ruggedcom RM1224 LTE(4G) EU | ||
Siemens Scalance M-800 Firmware | <5.0 | |
Siemens Scalance M-800 Firmware | ||
Siemens Scalance S615 Firmware | <5.0 | |
Siemens SCALANCE S615 firmware | ||
Siemens SCALANCE W1750D | <6.5.1.5 | |
Siemens Scalance W1750D Firmware | ||
Synology DiskStation Manager | =5.2 | |
Synology DiskStation Manager | =6.0 | |
Synology DiskStation Manager | =6.1 |
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14491 is classified as a high severity vulnerability due to its potential to cause denial of service or execute arbitrary code remotely.
To fix CVE-2017-14491, upgrade dnsmasq to version 2.80 or later on affected Debian systems, or to 2.78 for Red Hat systems.
CVE-2017-14491 affects multiple systems including Debian, Red Hat, and various Linux distributions using dnsmasq versions prior to 2.78.
CVE-2017-14491 is a heap-based buffer overflow vulnerability specifically within the DNS implementation of dnsmasq.
Yes, CVE-2017-14491 can be exploited remotely via crafted DNS responses, making it a critical threat.