Debian dla-3974 : dnsmasq - security update

high Nessus Plugin ID 211973

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-3974 advisory.

[email protected] Subject: [SECURITY] [DLA 3974-1] dnsmasq security update

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-3974-1 [email protected] https://www.debian.org/lts/security/ Lee Garrett November 29, 2024 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : dnsmasq Version : 2.85-1+deb11u1 CVE ID : CVE-2022-0934 CVE-2023-28450 CVE-2023-50387 CVE-2023-50868 Debian Bug :

Brief introduction

CVE-2022-0934

A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq.
This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.

CVE-2023-28450

An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.

CVE-2023-50387

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the KeyTrap issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.

CVE-2023-50868

The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the NSEC3 issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.

For Debian 11 bullseye, these problems have been fixed in version 2.85-1+deb11u1.

We recommend that you upgrade your dnsmasq packages.

For the detailed security status of dnsmasq please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/dnsmasq

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the dnsmasq packages.

See Also

https://security-tracker.debian.org/tracker/CVE-2023-28450

https://security-tracker.debian.org/tracker/CVE-2023-50387

https://security-tracker.debian.org/tracker/CVE-2023-50868

https://packages.debian.org/source/bullseye/dnsmasq

https://security-tracker.debian.org/tracker/source-package/dnsmasq

https://security-tracker.debian.org/tracker/CVE-2022-0934

Plugin Details

Severity: High

ID: 211973

File Name: debian_DLA-3974.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/30/2024

Updated: 11/30/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-50387

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:dnsmasq, p-cpe:/a:debian:debian_linux:dnsmasq-base, p-cpe:/a:debian:debian_linux:dnsmasq-utils, p-cpe:/a:debian:debian_linux:dnsmasq-base-lua

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 11/29/2024

Vulnerability Publication Date: 4/3/2022

Reference Information

CVE: CVE-2022-0934, CVE-2023-28450, CVE-2023-50387, CVE-2023-50868