ID

VAR-202101-0220


CVE

CVE-2020-25684


TITLE

dnsmasq  Security check vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-015547

DESCRIPTION

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. dnsmasq There is a security check vulnerability in.Information may be tampered with. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. For the stable distribution (buster), these problems have been fixed in version 2.80-1+deb10u1. We recommend that you upgrade your dnsmasq packages. For the detailed security status of dnsmasq please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dnsmasq Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAZVA4ACgkQEL6Jg/PV nWQYKAgAgVwonRAgXSliaFh0n44OPOz9wf4KibG7otcnAx4V4XqFAeXsHd/hIX/K IC313F3I+8WzvjKBhvt2KnGG9SnoTnq4roBIa1nz//vNX0hyfDm5xPlxQOExzC+c YS8kGt++SvC2wgOsrZEjyk0ecKqDJmZSwW31zXG9/2kTzCbKjuDp+i4TTADqabPC AgbmEGVKBR2Fk7K9Prct27oWoj7LHMaH+Ttb8uQGnG7OgJs9KyRI+2qIu+VaRCGf yfRj+XayPYHV1Amf5dLIKcLMMp/FnkNFoO2YIAZkWVPjXD2uPKUykJJ1GRl8R+0q qtNhPTNNuD6WnYzC8yP0KIQ2tsbg9Q== =j5Ka -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-4698-2 February 24, 2021 dnsmasq regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN-4698-1 introduced regressions in Dnsmasq. Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server Details: USN-4698-1 fixed vulnerabilities in Dnsmasq. The updates introduced regressions in certain environments related to issues with multiple queries, and issues with retries. This update fixes the problem. Original advisory details: Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled memory when sorting RRsets. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25681, CVE-2020-25687) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled extracting certain names. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25682, CVE-2020-25683) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented address/port checks. (CVE-2020-25684) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented query resource name checks. (CVE-2020-25685) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled multiple query requests for the same resource name. (CVE-2020-25686) It was discovered that Dnsmasq incorrectly handled memory during DHCP response creation. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2019-14834) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: dnsmasq 2.82-1ubuntu1.2 dnsmasq-base 2.82-1ubuntu1.2 dnsmasq-utils 2.82-1ubuntu1.2 Ubuntu 20.04 LTS: dnsmasq 2.80-1.1ubuntu1.3 dnsmasq-base 2.80-1.1ubuntu1.3 dnsmasq-utils 2.80-1.1ubuntu1.3 Ubuntu 18.04 LTS: dnsmasq 2.79-1ubuntu0.3 dnsmasq-base 2.79-1ubuntu0.3 dnsmasq-utils 2.79-1ubuntu0.3 Ubuntu 16.04 LTS: dnsmasq 2.75-1ubuntu0.16.04.8 dnsmasq-base 2.75-1ubuntu0.16.04.8 dnsmasq-utils 2.75-1ubuntu0.16.04.8 After a standard system update you need to reboot your computer to make all the necessary changes. 7) - aarch64, ppc64le, s390x 3. 7.7) - ppc64, ppc64le, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: dnsmasq security update Advisory ID: RHSA-2021:0153-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0153 Issue date: 2021-01-19 CVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 ==================================================================== 1. Summary: An update for dnsmasq is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Security Fix(es): * dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) * dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) * dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm ppc64: dnsmasq-2.76-16.el7_9.1.ppc64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm ppc64le: dnsmasq-2.76-16.el7_9.1.ppc64le.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm s390x: dnsmasq-2.76-16.el7_9.1.s390x.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm dnsmasq-utils-2.76-16.el7_9.1.ppc64.rpm ppc64le: dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm dnsmasq-utils-2.76-16.el7_9.1.ppc64le.rpm s390x: dnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm dnsmasq-utils-2.76-16.el7_9.1.s390x.rpm x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2021-001 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYAblHdzjgjWX9erEAQg6Xg//fXZBawqLgCXhC7jToJJgUA+WoERkMbil Vs5+OP4vp+nT2iA92mQ84rLTQG2tL2xhPfMxLVl+9aCH44RjJjmQ8F/ODvYxRCe4 MopmumQIwfGMAFK/n16jHAmkg+qMZa3ehUp+LuawnsIuGtC7BmiohLTZqjxFj754 6h79AhB8/zeX1buyqEBgo8kCTy/L+TRW/Xg/ENi6a6NTnwG3f2n89oxUOCASm2cA YF2Qc1L8yqd/5YXBA8E3gRouBe2caThWUo0qrG9ois7lYIJKlxzo9sq3n6qfc8bN hZ/OAKvNSnRSrC4AW8kHVskv0hR8kC+iX05ryujBdGRLiafHl9hLGy2E0qRR3mm3 hNyjhKzBNxwZZ3gF8nOQJyWtxSYJSwbl6n01ElEs+QexMKi/f+x8hML1BS1rf/tG JuOOyLTUGjWIdmmLEKNQa/A5h0rWwJhNhVKuK+iNGXTey8C1JmeNaYpeOn8JdK1E iS8ZT48mfu8MxvGVVbv8ARfMQtsWSo1IOMD/ttUh2SPflZ1Qpd2sGTR5sIJrq2JD XlWePyzEQSL0UEJ8FgYOeJJEt9Q/gWgiug7ZBZrmanzLaNv0DA0dLsD8kE/p2mml j6kxe9R0XnpTxnDTzKmmCaEXCFsrJIg872+57VfVbCeFcwV6pZMNMFACmMI6DJgX sGV/jc2cn78=iw2j -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.88

sources: NVD: CVE-2020-25684 // JVNDB: JVNDB-2020-015547 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 169002 // PACKETSTORM: 161535 // PACKETSTORM: 161020 // PACKETSTORM: 161019 // PACKETSTORM: 161017 // PACKETSTORM: 161010 // PACKETSTORM: 161015

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-16431

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.25.2f

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.23

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.23.7m

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.24

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.25

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.21

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.22.9m

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.21.14m

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.24.5m

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.22

Trust: 1.0

vendor:thekelleysmodel:dnsmasqscope:ltversion:2.83

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:thekelleysmodel:dnsmasqscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.83

Trust: 0.6

sources: CNVD: CNVD-2021-16431 // JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-25684
value: LOW

Trust: 1.0

NVD: CVE-2020-25684
value: LOW

Trust: 0.8

CNVD: CNVD-2021-16431
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202101-1611
value: LOW

Trust: 0.6

VULMON: CVE-2020-25684
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-25684
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-16431
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-25684
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2020-25684
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // CNNVD: CNNVD-202101-1611 // JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

PROBLEMTYPE DATA

problemtype:CWE-358

Trust: 1.0

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Improperly implemented security checks (CWE-358) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 161535 // PACKETSTORM: 161010 // CNNVD: CNNVD-202101-1611

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202101-1611

PATCH

title:Top Pageurl:https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html

Trust: 0.8

title:Patch for Dnsmasq security feature issue vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/251931

Trust: 0.6

title:Dnsmasq Fixing measures for security feature vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139960

Trust: 0.6

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210156 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210240 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210245 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210153 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210154 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210155 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210401 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210395 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210151 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210150 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210152 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-25684 log

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1587url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1587

Trust: 0.1

title:Debian Security Advisories: DSA-4844-1 dnsmasq -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6bdd82a7af8c0333eca753b3b7b02111

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.4.33 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210281 - Security Advisory

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.1

title:dnspooqurl:https://github.com/knqyf263/dnspooq

Trust: 0.1

title:multironic Requirements: Install libvirt and prepare nodes have to check why we need this TODO download ironic images later Pull images Tag images Push images run httpd Check that two vbmcs are running for the two nodes Play with vbmc and ipmitools Run management cluster Firewall Launch ironic run capm3 Firewall Refurl:https://github.com/mboukhalfa/multironic

Trust: 0.1

title:Criminal IP NSE Scripturl:https://github.com/criminalip/CIP-NSE-Script

Trust: 0.1

title:Intro: What's pique or repique Overviewurl:https://github.com/AZ-X/pique

Trust: 0.1

title:https://github.com/klcheung99/CSCM28CW2url:https://github.com/klcheung99/CSCM28CW2

Trust: 0.1

title:Kaosagnt's Ansible Everyday Utilsurl:https://github.com/kaosagnt/ansible-everyday

Trust: 0.1

title:F5の脆弱性情報url:https://github.com/DNTYO/F5_Vulnerability

Trust: 0.1

title:Vulnerabilityurl:https://github.com/tzwlhack/Vulnerability

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/JERRY123S/all-poc

Trust: 0.1

title:SecBooks SecBooks目录url:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/top

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/awesome-cve-repo

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/hktalent/TOP

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/cyberanand1337x/bug-bounty-2022

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/weeka10/-hktalent-TOP

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/01/20/dns_cache_poisoning/

Trust: 0.1

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // CNNVD: CNNVD-202101-1611 // JVNDB: JVNDB-2020-015547

EXTERNAL IDS

db:NVDid:CVE-2020-25684

Trust: 3.8

db:AUSCERTid:ESB-2021.0231

Trust: 1.2

db:CERT/CCid:VU#434904

Trust: 1.0

db:JVNid:JVNVU90340376

Trust: 0.8

db:JVNDBid:JVNDB-2020-015547

Trust: 0.8

db:PACKETSTORMid:161535

Trust: 0.7

db:CNVDid:CNVD-2021-16431

Trust: 0.6

db:PACKETSTORMid:161281

Trust: 0.6

db:PACKETSTORMid:161085

Trust: 0.6

db:AUSCERTid:ESB-2021.0987

Trust: 0.6

db:AUSCERTid:ESB-2021.0420

Trust: 0.6

db:AUSCERTid:ESB-2021.0692

Trust: 0.6

db:AUSCERTid:ESB-2021.0864

Trust: 0.6

db:AUSCERTid:ESB-2021.0283

Trust: 0.6

db:AUSCERTid:ESB-2021.1088

Trust: 0.6

db:AUSCERTid:ESB-2021.0699

Trust: 0.6

db:CS-HELPid:SB2021122911

Trust: 0.6

db:CS-HELPid:SB2021070106

Trust: 0.6

db:ICS CERTid:ICSA-21-019-01

Trust: 0.6

db:CNNVDid:CNNVD-202101-1611

Trust: 0.6

db:VULMONid:CVE-2020-25684

Trust: 0.1

db:PACKETSTORMid:169002

Trust: 0.1

db:PACKETSTORMid:161020

Trust: 0.1

db:PACKETSTORMid:161019

Trust: 0.1

db:PACKETSTORMid:161017

Trust: 0.1

db:PACKETSTORMid:161010

Trust: 0.1

db:PACKETSTORMid:161015

Trust: 0.1

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 169002 // PACKETSTORM: 161535 // PACKETSTORM: 161020 // PACKETSTORM: 161019 // PACKETSTORM: 161017 // PACKETSTORM: 161010 // PACKETSTORM: 161015 // CNNVD: CNNVD-202101-1611 // JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1889686

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-25684

Trust: 2.1

url:https://www.jsof-tech.com/disclosures/dnspooq/

Trust: 1.7

url:https://security.gentoo.org/glsa/202101-17

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-4844

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61

Trust: 1.7

url:https://www.auscert.org.au/bulletins/esb-2021.0231/

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 1.1

url:https://www.kb.cert.org/vuls/id/434904

Trust: 1.0

url:https://jvn.jp/vu/jvnvu90340376/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25686

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-25685

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 0.6

url:https://packetstormsecurity.com/files/161281/red-hat-security-advisory-2021-0401-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161535/ubuntu-security-notice-usn-4698-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161085/gentoo-linux-security-advisory-202101-17.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0699

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0864

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210120-01-dnspooq-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0987

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0283/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0692

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1088

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0420

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070106

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-privileged-identity-manager-is-affected-by-security-vulnerabilities-cve-2020-25684-cve-2020-25685-cve-2020-25686/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122911

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-25685

Trust: 0.4

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-001

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-25686

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-25684

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/errata/rhsa-2021:0156

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-14834

Trust: 0.2

url:https://usn.ubuntu.com/4698-1

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/knqyf263/dnspooq

Trust: 0.1

url:https://security.archlinux.org/cve-2020-25684

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25683

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/dnsmasq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25682

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.8

Trust: 0.1

url:https://usn.ubuntu.com/4698-2

Trust: 0.1

url:https://launchpad.net/bugs/1916462

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.2

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0155

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0154

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0153

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.7

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.2

Trust: 0.1

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 169002 // PACKETSTORM: 161535 // PACKETSTORM: 161020 // PACKETSTORM: 161019 // PACKETSTORM: 161017 // PACKETSTORM: 161010 // PACKETSTORM: 161015 // CNNVD: CNNVD-202101-1611 // JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

CREDITS

Ubuntu

Trust: 0.8

sources: PACKETSTORM: 161535 // PACKETSTORM: 161010 // CNNVD: CNNVD-202101-1611

SOURCES

db:CNVDid:CNVD-2021-16431
db:VULMONid:CVE-2020-25684
db:PACKETSTORMid:169002
db:PACKETSTORMid:161535
db:PACKETSTORMid:161020
db:PACKETSTORMid:161019
db:PACKETSTORMid:161017
db:PACKETSTORMid:161010
db:PACKETSTORMid:161015
db:CNNVDid:CNNVD-202101-1611
db:JVNDBid:JVNDB-2020-015547
db:NVDid:CVE-2020-25684

LAST UPDATE DATE

2026-03-25T21:47:06.817000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-16431date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25684date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202101-1611date:2022-03-10T00:00:00
db:JVNDBid:JVNDB-2020-015547date:2021-10-04T08:30:00
db:NVDid:CVE-2020-25684date:2025-11-04T20:15:57.223

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-16431date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25684date:2021-01-20T00:00:00
db:PACKETSTORMid:169002date:2021-02-28T20:12:00
db:PACKETSTORMid:161535date:2021-02-25T15:26:41
db:PACKETSTORMid:161020date:2021-01-19T14:46:21
db:PACKETSTORMid:161019date:2021-01-19T14:46:12
db:PACKETSTORMid:161017date:2021-01-19T14:45:56
db:PACKETSTORMid:161010date:2021-01-19T14:43:50
db:PACKETSTORMid:161015date:2021-01-19T14:45:36
db:CNNVDid:CNNVD-202101-1611date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2020-015547date:2021-10-04T00:00:00
db:NVDid:CVE-2020-25684date:2021-01-20T16:15:14.163