Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity.
CVSS Information
N/A
Vulnerability Type
不恰当实现的标准安全检查
Vulnerability Title
Dnsmasq 安全漏洞
Vulnerability Description
Dnsmasq是一款使用C语言编写的轻量级DNS转发和DHCP、TFTP服务器。 dnsmasq 2.83版本之前存在安全漏洞,攻击者可以利用该漏洞执行DNS缓存中毒攻击。
CVSS Information
N/A
Vulnerability Type
N/A