SB2017100222 - Memory corruption in dnsmasq (Alpine package)
Published: October 2, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory corruption (CVE-ID: CVE-2017-14496)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to boundary error in add_pseudoheader() function when processing DNS queries. A remote unauthenticated attacker can send a specially crafted DNS request to the affected service, cause dnsmasq to call memcpy with negative size and crash.
Successful exploitation of this vulnerability may allow an attacker to perform a denial of service (DoS) attack, but requires that dnsmasq is compiled with --add-mac, --add-cpe-id or --add-subnet option.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=e84b81b48310608c89511d450f0deec9b1e04b1c
- https://git.alpinelinux.org/aports/commit/?id=9af72b19675b1be5e4f838b5dc97b5fa4d7211d0
- https://git.alpinelinux.org/aports/commit/?id=b14fc437abacc82496ff9f347444eb0f5ebd2f3d
- https://git.alpinelinux.org/aports/commit/?id=70e17b5cf82bae935c9371277ce3d632742f5488
- https://git.alpinelinux.org/aports/commit/?id=3640e0ea2d3be8fc17d71b9faad5a0b8806d7f78
- https://git.alpinelinux.org/aports/commit/?id=3afe33ad348010beb44371a68febd5f2f252299a
- https://git.alpinelinux.org/aports/commit/?id=43dd2c9dbd748d5b095ba9eec3da18255d5bd158
- https://git.alpinelinux.org/aports/commit/?id=e2b7176ff9d902f7e8837d4a7ef0d560c903fc35