CVE-2020-25681

A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in the way RRSets are sorted before validating with DNSSEC data. An attacker on the network, who can forge DNS replies such as that they are accepted as valid, could use this flaw to cause a buffer overflow with arbitrary data in a heap memory segment, possibly executing code on the machine. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
thekelleysdnsmasq
𝑥
< 2.83
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnsmasq
bullseye
2.85-1
fixed
bookworm
2.89-1
fixed
sid
2.90-4
fixed
trixie
2.90-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsmasq
noble
Fixed 2.82-1ubuntu2
released
mantic
Fixed 2.82-1ubuntu2
released
lunar
Fixed 2.82-1ubuntu2
released
kinetic
Fixed 2.82-1ubuntu2
released
jammy
Fixed 2.82-1ubuntu2
released
impish
Fixed 2.82-1ubuntu2
released
hirsute
Fixed 2.82-1ubuntu2
released
groovy
Fixed 2.82-1ubuntu1.1
released
focal
Fixed 2.80-1.1ubuntu1.2
released
bionic
Fixed 2.79-1ubuntu0.2
released
xenial
Fixed 2.75-1ubuntu0.16.04.7
released
trusty
needs-triage