ALT-PU-2021-1645-1
Closed vulnerabilities
Published: 2021-04-08
BDU:2022-04028
Уязвимость DNS-сервера Dnsmasq, связанная с неправильно реализованной проверкой безопасности для стандартных элементов, позволяющая нарушителю реализовать атаку отравления кэша DNS
Severity: MEDIUM (4.0)
Vector: AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
References:
Published: 2021-04-09
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-3448
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Severity: MEDIUM (4.0)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1939368
- https://bugzilla.redhat.com/show_bug.cgi?id=1939368
- FEDORA-2021-5cd2571751
- FEDORA-2021-5cd2571751
- FEDORA-2021-9433bedebd
- FEDORA-2021-9433bedebd
- FEDORA-2021-62a5062b2d
- FEDORA-2021-62a5062b2d
- GLSA-202105-20
- GLSA-202105-20
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html