CVE Vulnerabilities

CVE-2021-3448

Published: Apr 08, 2021 | Modified: Nov 07, 2023
CVSS 3.x
4
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
4 MODERATE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
Ubuntu
LOW

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

Affected Software

Name Vendor Start Version End Version
Dnsmasq Thekelleys * 2.85 (excluding)
Red Hat Enterprise Linux 8 RedHat dnsmasq-0:2.79-19.el8 *
Dnsmasq Ubuntu bionic *
Dnsmasq Ubuntu devel *
Dnsmasq Ubuntu esm-infra-legacy/trusty *
Dnsmasq Ubuntu esm-infra/xenial *
Dnsmasq Ubuntu focal *
Dnsmasq Ubuntu groovy *
Dnsmasq Ubuntu hirsute *
Dnsmasq Ubuntu impish *
Dnsmasq Ubuntu jammy *
Dnsmasq Ubuntu kinetic *
Dnsmasq Ubuntu lunar *
Dnsmasq Ubuntu mantic *
Dnsmasq Ubuntu noble *
Dnsmasq Ubuntu oracular *
Dnsmasq Ubuntu precise/esm *
Dnsmasq Ubuntu trusty *
Dnsmasq Ubuntu trusty/esm *
Dnsmasq Ubuntu upstream *
Dnsmasq Ubuntu xenial *

References