SB2016063013 - Input validation error in GNU Dnsmasq
Published: June 30, 2016 Updated: July 28, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2015-8899)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
Remediation
Install update from vendor's website.
References
- http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html
- http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87
- http://www.openwall.com/lists/oss-security/2016/06/03/7
- http://www.openwall.com/lists/oss-security/2016/06/04/2
- http://www.securityfocus.com/bid/91031
- http://www.securitytracker.com/id/1036045
- http://www.ubuntu.com/usn/USN-3009-1