CVE-2020-25681

EUVD-2020-18343
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
Affected Products (NVD)
VendorProductVersion
thekelleysdnsmasq
𝑥
< 2.83
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnsmasq
bookworm
2.89-1
fixed
bullseye
2.85-1
fixed
sid
2.90-4
fixed
trixie
2.90-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsmasq
bionic
Fixed 2.79-1ubuntu0.2
released
focal
Fixed 2.80-1.1ubuntu1.2
released
groovy
Fixed 2.82-1ubuntu1.1
released
hirsute
Fixed 2.82-1ubuntu2
released
impish
Fixed 2.82-1ubuntu2
released
jammy
Fixed 2.82-1ubuntu2
released
kinetic
Fixed 2.82-1ubuntu2
released
lunar
Fixed 2.82-1ubuntu2
released
mantic
Fixed 2.82-1ubuntu2
released
noble
Fixed 2.82-1ubuntu2
released
trusty
needs-triage
xenial
Fixed 2.75-1ubuntu0.16.04.7
released