Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010479.html
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2016q2/010505.html
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87
http://www.openwall.com/lists/oss-security/2016/06/03/7
http://www.openwall.com/lists/oss-security/2016/06/04/2
http://www.securityfocus.com/bid/91031
Source: MITRE
Published: 2016-06-30
Updated: 2016-11-28
Type: CWE-20
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH