First published: Thu Aug 01 2019(Updated: )
Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | <2.76 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14513 is a vulnerability in Dnsmasq before version 2.76 that allows an attacker controlled DNS server to send large DNS packets and cause a read operation beyond the allocated buffer.
The severity of CVE-2019-14513 is high with a severity value of 7.5.
Dnsmasq versions up to and excluding 2.76 and Debian Linux 8.0 are affected by CVE-2019-14513.
An attacker can exploit CVE-2019-14513 by leveraging an attacker controlled DNS server to send large DNS packets to the vulnerable system.
Yes, you can find references related to CVE-2019-14513 at the following links: https://github.com/Slovejoy/dnsmasq-pre2.76, https://lists.debian.org/debian-lts-announce/2019/09/msg00013.html