CVE-2015-3294

EUVD-2015-3341
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 39%
Affected Products (NVD)
VendorProductVersion
thekelleysdnsmasq
𝑥
≤ 2.73
oraclesolaris
11.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnsmasq
bookworm
2.89-1
fixed
bullseye
2.85-1
fixed
sid
2.90-4
fixed
trixie
2.90-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsmasq
lucid
ignored
precise
Fixed 2.59-4ubuntu0.2
released
trusty
Fixed 2.68-1ubuntu0.1
released
utopic
Fixed 2.71-1ubuntu0.1
released
vivid
Fixed 2.72-3ubuntu0.1
released
Common Weakness Enumeration