dnsmasq < 2.73rc4 setup_reply() Function Return Value Checking Information Disclosure

Medium Nessus Plugin ID 87596


The remote DNS / DHCP service is affected by an information disclosure vulnerability.


The remote dnsmasq server is running a version prior to 2.73rc4. It is, therefore, affected by an information disclosure vulnerability due not properly checking the return value from the setup_reply() function during TCP connections. An unauthenticated, remote attacker can exploit this to disclose sensitive information.


Upgrade to dnsmasq 2.73rc4 or later.

See Also



Plugin Details

Severity: Medium

ID: 87596

File Name: dnsmasq_dos-CVE-2015-3294.nasl

Version: $Revision: 1.2 $

Type: remote

Family: DNS

Published: 2015/12/22

Modified: 2015/12/29

Dependencies: 72779

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:thekelleys:dnsmasq

Required KB Items: dns_server/version, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/04/09

Vulnerability Publication Date: 2015/04/07

Reference Information

CVE: CVE-2015-3294

BID: 74452

OSVDB: 121174