|
|||
Rule General Information |
---|
Release Date: | 2019-03-12 | |
Rule Name: | Dnsmasq DHCPv6 Stack Buffer Overflow Vulnerability -2 (CVE-2017-14493) | |
Severity: | ||
CVE ID: | ||
CNNVD ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Other Unix, FreeBSD, Linux | |
Reference: | SecurityFocusBID:101085 ExploitDB:42943 http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html http://nvidia.custhelp.com/app/answers/detail/a_id/4561 |
|
Solutions |
---|
The vendor has issued a fix (2.78). The vendor advisory is available at http://www.thekelleys.org.uk/dnsmasq/CHANGELOG |