SB20210120127 - Red Hat Enterprise Linux 8 update for dnsmasq
Published: January 20, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2020-25681)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in "sort_rrset()" when DNSSEC is used. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Heap-based buffer overflow (CVE-ID: CVE-2020-25682)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in "extract_name()" function when DNSSEC is enabled. A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Heap-based buffer overflow (CVE-ID: CVE-2020-25683)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in rfc1035.c:extract_name(). A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and cause a denial of service condition on the target system.
4) Insufficient verification of data authenticity (CVE-ID: CVE-2020-25684)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a lack of proper address/port check within the "reply_query" function. A remote attacker can perform a DNS cache poisoning attack.
5) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2020-25685)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a lack of query resource name (RRNAME) checks in the "reply_query" function. A remote attacker can perform a DNS cache poisoning attack.
6) Insufficient verification of data authenticity (CVE-ID: CVE-2020-25686)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the affected software does not check for an existing pending request for the same name and forwards a new request. A remote attacker can perform a DNS cache poisoning attack.
7) Heap-based buffer overflow (CVE-ID: CVE-2020-25687)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in rfc1035.c:extract_name(). A remote attacker can pass specially crafted data to the application, trigger heap-based buffer overflow and cause a denial of service condition on the target system.
Remediation
Install update from vendor's website.