CVE-2015-3294

Impact:
Moderate
Public Date:
2015-04-23
CWE:
CWE-252
Bugzilla:
1215747: CVE-2015-3294 dnsmasq: unchecked return value of the setup_reply() function

The MITRE CVE dictionary describes this issue as:

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

Find out more about CVE-2015-3294 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7 dnsmasq Will not fix
Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) dnsmasq Will not fix
Red Hat Enterprise Linux OpenStack Platform 4.0 dnsmasq Will not fix
Red Hat Enterprise Linux 7 dnsmasq Will not fix
Red Hat Enterprise Linux 6 dnsmasq Will not fix
Red Hat Enterprise Linux 5 dnsmasq Will not fix

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.