The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dnsmasq | Thekelleys | * | 2.73 (including) |
Dnsmasq | Ubuntu | lucid | * |
Dnsmasq | Ubuntu | precise | * |
Dnsmasq | Ubuntu | trusty | * |
Dnsmasq | Ubuntu | upstream | * |
Dnsmasq | Ubuntu | utopic | * |
Dnsmasq | Ubuntu | vivid | * |
Dnsmasq | Ubuntu | vivid/stable-phone-overlay | * |