Language:
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
http://www.nessus.org/u?1684fac7
http://www.nessus.org/u?2aa30bbb
http://www.nessus.org/u?4e408fdc
http://www.nessus.org/u?e3cd1c58
http://www.nessus.org/u?d610ee71
http://www.nessus.org/u?90a10783
http://www.nessus.org/u?32875869
http://www.nessus.org/u?dfdf89ab
http://www.nessus.org/u?8fac9ecd
http://www.nessus.org/u?460d9edd
http://www.nessus.org/u?e88e5476
http://www.nessus.org/u?1e246b99
http://www.nessus.org/u?dcbc583d
http://www.nessus.org/u?edfa62f7
http://www.nessus.org/u?8916059f
http://www.nessus.org/u?c7493663
Severity: Critical
ID: 103647
File Name: dnsmasq_2_78.nasl
Version: 1.7
Type: remote
Family: DNS
Published: 10/3/2017
Updated: 5/8/2020
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2017-14493
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:thekelleys:dnsmasq
Required KB Items: Settings/ParanoidReport, dns_server/version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/2/2017
Vulnerability Publication Date: 9/2/2017
Core Impact
CVE: CVE-2017-13704, CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, CVE-2017-14495, CVE-2017-14496
IAVA: 2017-A-0284-S