FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

dnsmasq -- DNS cache poisoning, and DNSSEC buffer overflow, vulnerabilities

Affected packages
dnsmasq < 2.83
dnsmasq-devel < 2.83

Details

VuXML ID 5b5cf6e5-5b51-11eb-95ac-7f9491278677
Discovery 2020-09-16
Entry 2021-01-20

Simon Kelley reports:

There are broadly two sets of problems. The first is subtle errors in dnsmasq's protections against the chronic weakness of the DNS protocol to cache-poisoning attacks; the Birthday attack, Kaminsky, etc.[...]

the second set of errors is a good old fashioned buffer overflow in dnsmasq's DNSSEC code. If DNSSEC validation is enabled, an installation is at risk.

References

CVE Name CVE-2020-25681
CVE Name CVE-2020-25682
CVE Name CVE-2020-25683
CVE Name CVE-2020-25684
CVE Name CVE-2020-25685
CVE Name CVE-2020-25686
CVE Name CVE-2020-25687
URL https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014599.html
URL https://www.jsof-tech.com/disclosures/dnspooq/