First published: Tue Jan 07 2020(Updated: )
A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | <2.81 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2019-14834.
CVE-2019-14834 has a severity level of medium, with a severity value of 3.7.
The affected software for CVE-2019-14834 includes Thekelleys Dnsmasq versions up to and excluding 2.81 and Fedoraproject Fedora version 31.
Remote attackers can exploit CVE-2019-14834 by causing a denial of service (memory consumption) through vectors involving DHCP response creation.
Yes, there are references available for CVE-2019-14834. You can find them at the following links: [1] http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=69bc94779c2f035a9fffdb5327a54c3aeca73ed5 [2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14834 [3] https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JU474LT66BHNVFG5C4GEV3VTZNAEJ3BS/