CVE-2017-13704
03.10.2017, 01:29
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.Enginsight
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.04 |
debian | debian_linux | 7.0 |
debian | debian_linux | 7.1 |
debian | debian_linux | 9.0 |
novell | leap | 42.2 |
novell | leap | 42.3 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_workstation | 7.0 |
thekelleys | dnsmasq | 𝑥 ≤ 2.77 |
𝑥
= Vulnerable software versions

Debian Releases
Common Weakness Enumeration
References