First published: Fri Dec 31 2021(Updated: )
** DISPUTED ** Dnsmasq 2.86 has a heap-based buffer overflow in answer_request (called from FuzzAnswerTheRequest and fuzz_rfc1035.c). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thekelleys Dnsmasq | =2.86 | |
=2.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-45957 is critical with a severity value of 9.8.
The affected software for CVE-2021-45957 is Dnsmasq version 2.86.
The vendor's position is that CVE-2021-45957 "does not represent a real vulnerability, to the best of our knowledge."
To fix CVE-2021-45957, it is recommended to update to the latest version of Dnsmasq.
The Common Weakness Enumerations (CWE) associated with CVE-2021-45957 are CWE-119 and CWE-787.