CVE-2021-3448

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
VendorProductVersion
thekelleysdnsmasq
𝑥
< 2.85
redhatenterprise_linux
8.0
oraclecommunications_cloud_native_core_network_function_cloud_native_environment
1.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnsmasq
bullseye
2.85-1
fixed
buster
postponed
stretch
postponed
bookworm
2.89-1
fixed
sid
2.90-4
fixed
trixie
2.90-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsmasq
noble
Fixed 2.85-1ubuntu1
released
mantic
Fixed 2.85-1ubuntu1
released
lunar
Fixed 2.85-1ubuntu1
released
kinetic
Fixed 2.85-1ubuntu1
released
jammy
Fixed 2.85-1ubuntu1
released
impish
Fixed 2.85-1ubuntu1
released
hirsute
Fixed 2.84-1ubuntu2.1
released
groovy
Fixed 2.82-1ubuntu1.3
released
focal
Fixed 2.80-1.1ubuntu1.4
released
bionic
Fixed 2.79-1ubuntu0.4
released
xenial
Fixed 2.79-1ubuntu0.16.04.1+esm1
released
trusty
needed