[ASA-201801-32] dnsmasq: insufficient validation
Levente Polyak
anthraxx at archlinux.org
Wed Jan 31 00:05:33 UTC 2018
Arch Linux Security Advisory ASA-201801-32
==========================================
Severity: Medium
Date : 2018-01-30
CVE-ID : CVE-2017-15107
Package : dnsmasq
Type : insufficient validation
Remote : Yes
Link : https://security.archlinux.org/AVG-592
Summary
=======
The package dnsmasq before version 2.78-2 is vulnerable to insufficient
validation.
Resolution
==========
Upgrade to 2.78-2.
# pacman -Syu "dnsmasq>=2.78-2"
The problem has been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
A vulnerability was found in Dnsmasq's implementation of DNSSEC before
2.79. Wildcard synthesized NSEC records could be improperly interpreted
to prove the non-existence of hostnames that actually exist.
Impact
======
A remote attacker may be able to prove the non-existence of hostnames
that actually exist by using wildcard synthesized NSEC records that
could be improperly interpreted,
References
==========
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=4fe6744a220eddd3f1749b40cac3dfc510787de6
http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2018q1/011896.html
https://security.archlinux.org/CVE-2017-15107
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20180131/f79fd7cb/attachment.asc>
More information about the arch-security
mailing list