CVE-2015-3294

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
Configurations

Configuration 1 (hide)

cpe:2.3:a:thekelleys:dnsmasq:*:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*

History

07 Nov 2023, 02:25

Type Values Removed Values Added
References
  • {'url': 'http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=ad4a8ff7d9097008d7623df8543df435bfddeac8', 'name': 'http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=ad4a8ff7d9097008d7623df8543df435bfddeac8', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=ad4a8ff7d9097008d7623df8543df435bfddeac8 -

Information

Published : 2015-05-08 14:59

Updated : 2023-12-10 11:46


NVD link : CVE-2015-3294

Mitre link : CVE-2015-3294

CVE.ORG link : CVE-2015-3294


JSON object : View

Products Affected

oracle

  • solaris

thekelleys

  • dnsmasq
CWE
CWE-19

Data Processing Errors