First published: Tue Mar 16 2021(Updated: )
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | <2.85 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =1.9.0 | |
redhat/dnsmasq | <2.85 | 2.85 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw is CVE-2021-3448.
CVE-2021-3448 has a severity level of medium.
Dnsmasq versions before 2.85, Redhat Enterprise Linux 8.0, Fedora 32, Fedora 33, Fedora 34, and Oracle Communications Cloud Native Core Network Function Cloud Native Environment 1.9.0 are affected by CVE-2021-3448.
CVE-2021-3448 is a flaw in dnsmasq that allows an attacker on the network to guess the random transmission ID by finding the outgoing port used by dnsmasq.
To fix CVE-2021-3448, users should update dnsmasq to version 2.85 or later.