SB2023042040 - Denial of service in Dnsmasq
Published: April 20, 2023 Updated: July 26, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2023-28450)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly perform fragmentation of UDP packets. A remote attacker can trigger resource exhaustion by sending overly large DNS UDP packets.
2) Integer overflow (CVE-ID: CVE-2023-49441)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to integer overflow within the sha256_transform() function in hash-questions.c when comparing hashes. A remote attacker can send specially crafted data to the server, trigger an integer overflow and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blob;f=CHANGELOG
- https://capec.mitre.org/data/definitions/495.html
- https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=eb92fb32b746f2104b0f370b5b295bb8dd4bd5e5
- https://thekelleys.org.uk/dnsmasq/doc.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OU2ZT4ITSEOOR2CFBAHK4Z67KXJIEWQA/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6UQ6LKDTLSSD64TBIZ3XEKBM2SWC63VV/
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q4/017332.html
- https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=blobdiff;f=src/hash-questions.c;h=e6304ac807a8b7802bb50208ee5a846f4d62d8b7;hp=c1ee1354433df5e4aea1fe9f4622d30eca79ce01;hb=65c2d6afd67a032f45f40d7e4d620f5d73e5f07d;hpb=b27b94cfdc5e0cad6a5a8675471e0bdc64676006