ID CVE-2008-3350
Summary dnsmasq 2.43 allows remote attackers to cause a denial of service (daemon crash) by (1) sending a DHCPINFORM while lacking a DHCP lease, or (2) attempting to renew a nonexistent DHCP lease for an invalid subnet as an "unknown client," a different vulnerability than CVE-2008-3214.
References
Vulnerable Configurations
  • cpe:2.3:a:the_kelleys:dnsmasq:2.43
    cpe:2.3:a:the_kelleys:dnsmasq:2.43
CVSS
Base: 5.0 (as of 29-07-2008 - 14:28)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family DNS
    NASL id DNSMASQ_MULTIPLE_DOS.NASL
    description The remote host is running dnsmasq, a DHCP and DNS server. The version of dnsmasq installed on the remote host reports itself as 2.43. This version reportedly is affected by 3 denial of service issues : - The application can crash when an unknown client attempts to renew a DHCP lease. - The application may crash when a host which doesn't have a lease does a 'DHCPINFORM'. - There is a crash vulnerability in the netlink code.
    last seen 2019-02-21
    modified 2018-07-10
    plugin id 34111
    published 2008-09-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34111
    title dnsmasq < 2.45 Multiple Remote DoS
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200809-02.NASL
    description The remote host is affected by the vulnerability described in GLSA-200809-02 (dnsmasq: Denial of Service and DNS spoofing) Dan Kaminsky of IOActive reported that dnsmasq does not randomize UDP source ports when forwarding DNS queries to a recursing DNS server (CVE-2008-1447). Carlos Carvalho reported that dnsmasq in the 2.43 version does not properly handle clients sending inform or renewal queries for unknown DHCP leases, leading to a crash (CVE-2008-3350). Impact : A remote attacker could send spoofed DNS response traffic to dnsmasq, possibly involving generating queries via multiple vectors, and spoof DNS replies, which could e.g. lead to the redirection of web or mail traffic to malicious sites. Furthermore, an attacker could generate invalid DHCP traffic and cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 34091
    published 2008-09-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=34091
    title GLSA-200809-02 : dnsmasq: Denial of Service and DNS spoofing
refmap via4
confirm http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
mlist [dnsmasq-discuss] 20080720 dnsmasq 2.44 available.
secunia 31197
vupen ADV-2008-2166
xf
  • dnsmasq-dhcpinform-dos(43960)
  • dnsmasq-dhcplease-dos(43957)
statements via4
contributor Mark J Cox
lastmodified 2008-07-30
organization Red Hat
statement Not vulnerable. These issues did not affect the version of dnsmasq as shipped with Red Hat Enterprise Linux 5.
Last major update 07-03-2011 - 22:10
Published 28-07-2008 - 13:41
Last modified 07-08-2017 - 21:31
Back to Top