First published: Wed Sep 23 2020(Updated: )
A buffer overflow vulnerability was discovered in the way dnsmasq extract names from DNS packets before validating them with DNSSEC data. An attacker, who can create valid DNS replies, could use this flaw to cause an overflow with arbitrary data in a heap-allocated memory, possibly executing code on the machine. The flaw is in rfc1035.c:extract_name() function, which writes data to the memory pointed by `name` assuming MAXDNAME*2 bytes are available in the buffer. However, in some code execution paths it is possible extract_name() gets passed an offset from the base buffer, thus reducing in practice the number of available bytes that can be written in the buffer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dnsmasq | <2.83 | 2.83 |
Thekelleys Dnsmasq | <2.83 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/dnsmasq | 2.80-1+deb10u1 2.85-1 2.89-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25682 is a buffer overflow vulnerability in dnsmasq before version 2.83.
CVE-2020-25682 allows an attacker on the network to cause a buffer overflow in dnsmasq by creating valid DNS replies with arbitrary data.
CVE-2020-25682 has a severity score of 8.1 (high).
CVE-2020-25682 affects dnsmasq versions before 2.83.
To fix CVE-2020-25682, update dnsmasq to version 2.83 or higher.