dnsmasq < 2.73rc4 setup_reply() Function Return Value Checking Information Disclosure

medium Nessus Plugin ID 87596

Synopsis

The remote DNS / DHCP service is affected by an information disclosure vulnerability.

Description

The remote dnsmasq server is running a version prior to 2.73rc4. It is, therefore, affected by an information disclosure vulnerability due not properly checking the return value from the setup_reply() function during TCP connections. An unauthenticated, remote attacker can exploit this to disclose sensitive information.

Solution

Upgrade to dnsmasq 2.73rc4 or later.

See Also

http://www.nessus.org/u?3c7d3afa

http://www.thekelleys.org.uk/dnsmasq/CHANGELOG

Plugin Details

Severity: Medium

ID: 87596

File Name: dnsmasq_dos-CVE-2015-3294.nasl

Version: 1.4

Type: remote

Family: DNS

Published: 12/22/2015

Updated: 11/20/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2015-3294

Vulnerability Information

CPE: cpe:/a:thekelleys:dnsmasq

Required KB Items: Settings/ParanoidReport, dns_server/version

Exploit Ease: No known exploits are available

Patch Publication Date: 4/9/2015

Vulnerability Publication Date: 4/7/2015

Reference Information

CVE: CVE-2015-3294

BID: 74452