SUSE SLES12 Security Update : dnsmasq (SUSE-SU-2017:2616-1)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for dnsmasq fixes the following issues. Remedy the
following security issues :

- CVE-2017-14491: 2 byte heap based overflow.
[bsc#1060354]

- CVE-2017-14492: heap based overflow. [bsc#1060355]

- CVE-2017-14493: stack based overflow. [bsc#1060360]

- CVE-2017-14494: DHCP - info leak. [bsc#1060361]

- CVE-2017-14495: DNS - OOM DoS. [bsc#1060362]

- CVE-2017-14496: DNS - DoS Integer underflow.
[bsc#1060364]

- Prevent a man-in-the-middle attack (bsc#972164,
fate#321175). Furthermore, the following issues have
been fixed :

- Fix DHCP relaying, broken in 2.76 and 2.77.

- Update to version 2.78 (fate#321175, fate#322030,
bsc#1035227).

- Fix PXE booting for UEFI architectures (fate#322030).

- Drop PrivateDevices=yes which breaks logging
(bsc#902511, bsc#904537)

- Build with support for DNSSEC (fate#318323, bsc#908137).
Please note that this update brings a (small) potential
incompatibility in the handling of 'basename' in
--pxe-service. Please read the CHANGELOG and the
documentation if you are using this option.

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/1035227
https://bugzilla.suse.com/1060354
https://bugzilla.suse.com/1060355
https://bugzilla.suse.com/1060360
https://bugzilla.suse.com/1060361
https://bugzilla.suse.com/1060362
https://bugzilla.suse.com/1060364
https://bugzilla.suse.com/902511
https://bugzilla.suse.com/904537
https://bugzilla.suse.com/908137
https://bugzilla.suse.com/972164
https://www.suse.com/security/cve/CVE-2015-3294.html
https://www.suse.com/security/cve/CVE-2015-8899.html
https://www.suse.com/security/cve/CVE-2017-14491.html
https://www.suse.com/security/cve/CVE-2017-14492.html
https://www.suse.com/security/cve/CVE-2017-14493.html
https://www.suse.com/security/cve/CVE-2017-14494.html
https://www.suse.com/security/cve/CVE-2017-14495.html
https://www.suse.com/security/cve/CVE-2017-14496.html
http://www.nessus.org/u?36a0acf8

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 12-LTSS:zypper in -t patch
SUSE-SLE-SERVER-12-2017-1616=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 103637 ()

Bugtraq ID: 74452

CVE ID: CVE-2015-3294
CVE-2015-8899
CVE-2017-14491
CVE-2017-14492
CVE-2017-14493
CVE-2017-14494
CVE-2017-14495
CVE-2017-14496

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now