CVE-2017-14493

EUVD-2017-5996
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.04
debiandebian_linux
7.0
debiandebian_linux
7.1
debiandebian_linux
9.0
opensuseleap
42.2
opensuseleap
42.3
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_workstation
7.0
thekelleysdnsmasq
𝑥
≤ 2.77
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnsmasq
bookworm
2.89-1
fixed
bullseye
2.85-1
fixed
sid
2.90-4
fixed
trixie
2.90-4
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsmasq
trusty
Fixed 2.68-1ubuntu0.2
released
xenial
Fixed 2.75-1ubuntu0.16.04.3
released
zesty
Fixed 2.76-5ubuntu0.1
released
References