CVE-2023-28450

EUVD-2023-32132
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 1%
Affected Products (NVD)
VendorProductVersion
thekelleysdnsmasq
𝑥
< 2.90
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dnsmasq
bookworm
no-dsa
bullseye
vulnerable
bullseye (security)
2.85-1+deb11u1
fixed
buster
no-dsa
sid
2.90-7
fixed
trixie
2.90-7
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dnsmasq
bionic
Fixed 2.79-1ubuntu0.7
released
focal
Fixed 2.80-1.1ubuntu1.7
released
jammy
Fixed 2.86-1.1ubuntu0.3
released
kinetic
Fixed 2.86-1.1ubuntu2.1
released
lunar
ignored
mantic
Fixed 2.90-0ubuntu0.23.10.1
released
noble
Fixed 2.90-1
released
trusty
Fixed 2.68-1ubuntu0.2+esm2
released
xenial
Fixed 2.79-1ubuntu0.16.04.1+esm2
released