CVE-2021-45955

critical

Description

Dnsmasq 2.86 has a heap-based buffer overflow in resize_packet (called from FuzzResizePacket and fuzz_rfc1035.c) because of the lack of a proper bounds check upon pseudo header re-insertion. NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities, to the best of our knowledge." However, a contributor states that a security patch (mentioned in 016162.html) is needed

References

https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016164.html

https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2022q1/016162.html

https://github.com/google/oss-fuzz-vulns/blob/main/vulns/dnsmasq/OSV-2021-932.yaml

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35898

Details

Source: Mitre, NVD

Published: 2022-01-01

Updated: 2024-08-04

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical