The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Dnsmasq | Thekelleys | * | 2.73 (including) |
| Dnsmasq | Ubuntu | esm-infra-legacy/trusty | * |
| Dnsmasq | Ubuntu | lucid | * |
| Dnsmasq | Ubuntu | precise | * |
| Dnsmasq | Ubuntu | trusty | * |
| Dnsmasq | Ubuntu | trusty/esm | * |
| Dnsmasq | Ubuntu | upstream | * |
| Dnsmasq | Ubuntu | utopic | * |
| Dnsmasq | Ubuntu | vivid | * |
| Dnsmasq | Ubuntu | vivid/stable-phone-overlay | * |