First published: Fri Dec 31 2021(Updated: )
** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from answer_auth and FuzzAuth). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | =2.86 | |
=2.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45954 is a heap-based buffer overflow vulnerability in Dnsmasq version 2.86.
CVE-2021-45954 has a severity rating of 9.8, which is considered critical.
CVE-2021-45954 affects Dnsmasq version 2.86.
To fix CVE-2021-45954, update Dnsmasq to a version that is not affected by the vulnerability.
More information about CVE-2021-45954 can be found in the references provided: [reference1], [reference2], [reference3].