RULE(RULE ID:805362)

Rule General Information
Release Date: 2019-03-12
Rule Name: Dnsmasq DHCPv6 Stack Buffer Overflow Vulnerability -1 (CVE-2017-14493)
Severity:
CVE ID:
Rule Protection Details
Description: Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Other Unix, FreeBSD, Linux
Reference: SecurityFocusBID:101085
ExploitDB:42943
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4561
Solutions
The vendor has issued a fix (2.78). The vendor advisory is available at http://www.thekelleys.org.uk/dnsmasq/CHANGELOG