ID

VAR-202101-0221


CVE

CVE-2020-25685


TITLE

dnsmasq  Security check vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-015548

DESCRIPTION

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452, which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. dnsmasq There is a security check vulnerability in.Information may be tampered with. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. Dnsmasq has a security vulnerability, which stems from the use of a weak hash algorithm (CRC32) to verify DNS responses when compiling without dnnssec. No detailed vulnerability details are currently provided. ========================================================================== Ubuntu Security Notice USN-4698-2 February 24, 2021 dnsmasq regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN-4698-1 introduced regressions in Dnsmasq. Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server Details: USN-4698-1 fixed vulnerabilities in Dnsmasq. The updates introduced regressions in certain environments related to issues with multiple queries, and issues with retries. Original advisory details: Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled memory when sorting RRsets. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25681, CVE-2020-25687) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled extracting certain names. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25682, CVE-2020-25683) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented address/port checks. (CVE-2020-25684) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented query resource name checks. (CVE-2020-25685) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled multiple query requests for the same resource name. (CVE-2020-25686) It was discovered that Dnsmasq incorrectly handled memory during DHCP response creation. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2019-14834) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: dnsmasq 2.82-1ubuntu1.2 dnsmasq-base 2.82-1ubuntu1.2 dnsmasq-utils 2.82-1ubuntu1.2 Ubuntu 20.04 LTS: dnsmasq 2.80-1.1ubuntu1.3 dnsmasq-base 2.80-1.1ubuntu1.3 dnsmasq-utils 2.80-1.1ubuntu1.3 Ubuntu 18.04 LTS: dnsmasq 2.79-1ubuntu0.3 dnsmasq-base 2.79-1ubuntu0.3 dnsmasq-utils 2.79-1ubuntu0.3 Ubuntu 16.04 LTS: dnsmasq 2.75-1ubuntu0.16.04.8 dnsmasq-base 2.75-1ubuntu0.16.04.8 dnsmasq-utils 2.75-1ubuntu0.16.04.8 After a standard system update you need to reboot your computer to make all the necessary changes. Relevant releases/architectures: RHEL 8-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64 Red Hat Virtualization 4 Hypervisor for RHEL 8 - noarch, x86_64 Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - noarch 3. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Bug Fix(es): * Previously, the Red Hat Virtualization Host (RHV-H) repository (rhvh-4-for-rhel-8-x86_64-rpms) did not include the libsmbclient package, which is a dependency for the sssd-ad package. Consequently, the sssd-ad package failed to install. With this update, the libsmbclient is now in the RHV-H repository, and sssd-ad now installs on RHV-H. (BZ#1868967) 4. 7.2) - x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: dnsmasq security update Advisory ID: RHSA-2021:0155-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0155 Issue date: 2021-01-19 CVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 ==================================================================== 1. Summary: An update for dnsmasq is now available for Red Hat Enterprise Linux 7.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Security Fix(es): * dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) * dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) * dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6): Source: dnsmasq-2.76-7.el7_6.2.src.rpm x86_64: dnsmasq-2.76-7.el7_6.2.x86_64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6): x86_64: dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm dnsmasq-utils-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.6): Source: dnsmasq-2.76-7.el7_6.2.src.rpm ppc64: dnsmasq-2.76-7.el7_6.2.ppc64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64.rpm ppc64le: dnsmasq-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-2.76-7.el7_6.2.s390x.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm x86_64: dnsmasq-2.76-7.el7_6.2.x86_64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: dnsmasq-2.76-7.el7_6.2.src.rpm aarch64: dnsmasq-2.76-7.el7_6.2.aarch64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.aarch64.rpm ppc64le: dnsmasq-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-2.76-7.el7_6.2.s390x.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.6): ppc64: dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64.rpm dnsmasq-utils-2.76-7.el7_6.2.ppc64.rpm ppc64le: dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-utils-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm dnsmasq-utils-2.76-7.el7_6.2.s390x.rpm x86_64: dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm dnsmasq-utils-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: dnsmasq-debuginfo-2.76-7.el7_6.2.aarch64.rpm dnsmasq-utils-2.76-7.el7_6.2.aarch64.rpm ppc64le: dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-utils-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm dnsmasq-utils-2.76-7.el7_6.2.s390x.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2021-001 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYAboDtzjgjWX9erEAQiLag//YhXcBUOW0sEQ8k06WYSM8OkrXPNB0+Uq 53L0qcvoOWtSIkwV1CgVsHuLTXRPyelw4l/I3hZED+ACfEOUzGqYJOoWnc2HT712 e6rf5x8NVQpWpGLJbePFasiZ4b9Oe2cbpeveWUnJJyJ+9A/SKsAeANvvzvFIvPah le699qONS1DpTqS5v1vU7qqN0ZcdEdC83CeRjeYOoFx1+a9izFg9eKPyr3RdsrjF ze9Dv+6ZeCorrwMa9fyEVtmT91vmOGy6/1f2/9YlI9j/tjDfhv4HdlbHL0u2Eg2z eBaAkitgzgZ46L63hm6fNmTs9cO1AW+c8STkFjcv44vz4MJEQ60K2NiOqvuhm7ba GgU0rAJD1cPnHrriJ4DytwDpgGOhoC2a637mt0onni0U6ZZmvcVIkVY1m7muCyVr Vry4ViX/LrBgw+C46NTKHIlgZm2IzVH/OkgLpvXmf+SoQqQoiI75QaeTe432X9ie Ot9z14n5OFOwcAvOwnzUUIAR3oOxQfyhby8tgN+bRsIFOmYceYkocwc7DWGJQ+Zk mInUwGaEVAPkZzmTgxTjc5BGFdb9Ojsl32g1KbLAUv4SaUZtYzwGUxh0sMwEG5eY 8JqCsJP+4BDFBd70g7KZDdUkySJ0v3gb5+PS7KqnnRtYJb81Dl6FBxNc7x9KL8cG 3tTxc1zVYbM=RW1Z -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202101-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: January 22, 2021 Bugs: #766126 ID: 202101-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/dnsmasq < 2.83 >= 2.83 Description =========== Multiple vulnerabilities have been discovered in Dnsmasq. Workaround ========== There is no known workaround at this time. Resolution ========== All Dnsmasq users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.83" References ========== [ 1 ] CVE-2020-25681 https://nvd.nist.gov/vuln/detail/CVE-2020-25681 [ 2 ] CVE-2020-25682 https://nvd.nist.gov/vuln/detail/CVE-2020-25682 [ 3 ] CVE-2020-25683 https://nvd.nist.gov/vuln/detail/CVE-2020-25683 [ 4 ] CVE-2020-25684 https://nvd.nist.gov/vuln/detail/CVE-2020-25684 [ 5 ] CVE-2020-25685 https://nvd.nist.gov/vuln/detail/CVE-2020-25685 [ 6 ] CVE-2020-25686 https://nvd.nist.gov/vuln/detail/CVE-2020-25686 [ 7 ] CVE-2020-25687 https://nvd.nist.gov/vuln/detail/CVE-2020-25687 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202101-17 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.79

sources: NVD: CVE-2020-25685 // JVNDB: JVNDB-2020-015548 // CNVD: CNVD-2021-16430 // VULMON: CVE-2020-25685 // PACKETSTORM: 161535 // PACKETSTORM: 161281 // PACKETSTORM: 161100 // PACKETSTORM: 161020 // PACKETSTORM: 161010 // PACKETSTORM: 161085

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-16430

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.25.2f

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.23

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.23.7m

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.24

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.25

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.21

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.22.9m

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.21.14m

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.24.5m

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.22

Trust: 1.0

vendor:thekelleysmodel:dnsmasqscope:ltversion:2.83

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:thekelleysmodel:dnsmasqscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:dnsmasqmodel:dnsmasqscope:ltversion:2.83

Trust: 0.6

sources: CNVD: CNVD-2021-16430 // JVNDB: JVNDB-2020-015548 // NVD: CVE-2020-25685

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-25685
value: LOW

Trust: 1.0

NVD: CVE-2020-25685
value: LOW

Trust: 0.8

CNVD: CNVD-2021-16430
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202101-1574
value: LOW

Trust: 0.6

VULMON: CVE-2020-25685
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-25685
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-16430
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-25685
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2020-25685
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-16430 // VULMON: CVE-2020-25685 // CNNVD: CNNVD-202101-1574 // JVNDB: JVNDB-2020-015548 // NVD: CVE-2020-25685

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.0

problemtype:Improperly implemented security checks (CWE-358) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015548 // NVD: CVE-2020-25685

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 161535 // PACKETSTORM: 161010 // PACKETSTORM: 161085 // CNNVD: CNNVD-202101-1574

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-202101-1574

PATCH

title:FEDORA-2021-84440e87ba thekelleysthekelleysurl:https://www.debian.org/security/2021/dsa-4844

Trust: 0.8

title:Patch for Dnsmasq security feature issue vulnerability (CNVD-2021-16430)url:https://www.cnvd.org.cn/patchInfo/show/251936

Trust: 0.6

title:Dnsmasq Fixing measures for security feature vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=139940

Trust: 0.6

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210156 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210240 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210245 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210153 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210154 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210155 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210401 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210395 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210151 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210150 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210152 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-25685 log

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1587url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1587

Trust: 0.1

title:Debian Security Advisories: DSA-4844-1 dnsmasq -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6bdd82a7af8c0333eca753b3b7b02111

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.4.33 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210281 - Security Advisory

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.1

title:dnspooqurl:https://github.com/knqyf263/dnspooq

Trust: 0.1

title:multironic Requirements: Install libvirt and prepare nodes have to check why we need this TODO download ironic images later Pull images Tag images Push images run httpd Check that two vbmcs are running for the two nodes Play with vbmc and ipmitools Run management cluster Firewall Launch ironic run capm3 Firewall Refurl:https://github.com/mboukhalfa/multironic

Trust: 0.1

title:Criminal IP NSE Scripturl:https://github.com/criminalip/CIP-NSE-Script

Trust: 0.1

title:Intro: What's pique or repique Overviewurl:https://github.com/AZ-X/pique

Trust: 0.1

title:https://github.com/klcheung99/CSCM28CW2url:https://github.com/klcheung99/CSCM28CW2

Trust: 0.1

title:Kaosagnt's Ansible Everyday Utilsurl:https://github.com/kaosagnt/ansible-everyday

Trust: 0.1

title:F5の脆弱性情報url:https://github.com/DNTYO/F5_Vulnerability

Trust: 0.1

title:Vulnerabilityurl:https://github.com/tzwlhack/Vulnerability

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/JERRY123S/all-poc

Trust: 0.1

title:SecBooks SecBooks目录url:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/top

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/awesome-cve-repo

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/hktalent/TOP

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/cyberanand1337x/bug-bounty-2022

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/weeka10/-hktalent-TOP

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/01/20/dns_cache_poisoning/

Trust: 0.1

sources: CNVD: CNVD-2021-16430 // VULMON: CVE-2020-25685 // CNNVD: CNNVD-202101-1574 // JVNDB: JVNDB-2020-015548

EXTERNAL IDS

db:NVDid:CVE-2020-25685

Trust: 3.7

db:CERT/CCid:VU#434904

Trust: 1.0

db:JVNid:JVNVU90340376

Trust: 0.8

db:JVNDBid:JVNDB-2020-015548

Trust: 0.8

db:PACKETSTORMid:161535

Trust: 0.7

db:PACKETSTORMid:161281

Trust: 0.7

db:PACKETSTORMid:161085

Trust: 0.7

db:CNVDid:CNVD-2021-16430

Trust: 0.6

db:CS-HELPid:SB2021122911

Trust: 0.6

db:CS-HELPid:SB2021070106

Trust: 0.6

db:AUSCERTid:ESB-2021.0231

Trust: 0.6

db:AUSCERTid:ESB-2021.0864

Trust: 0.6

db:AUSCERTid:ESB-2021.0283

Trust: 0.6

db:AUSCERTid:ESB-2021.0692

Trust: 0.6

db:AUSCERTid:ESB-2021.1088

Trust: 0.6

db:AUSCERTid:ESB-2021.0699

Trust: 0.6

db:AUSCERTid:ESB-2021.0420

Trust: 0.6

db:ICS CERTid:ICSA-21-019-01

Trust: 0.6

db:CNNVDid:CNNVD-202101-1574

Trust: 0.6

db:VULMONid:CVE-2020-25685

Trust: 0.1

db:PACKETSTORMid:161100

Trust: 0.1

db:PACKETSTORMid:161020

Trust: 0.1

db:PACKETSTORMid:161010

Trust: 0.1

sources: CNVD: CNVD-2021-16430 // VULMON: CVE-2020-25685 // PACKETSTORM: 161535 // PACKETSTORM: 161281 // PACKETSTORM: 161100 // PACKETSTORM: 161020 // PACKETSTORM: 161010 // PACKETSTORM: 161085 // CNNVD: CNNVD-202101-1574 // JVNDB: JVNDB-2020-015548 // NVD: CVE-2020-25685

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1889688

Trust: 2.5

url:https://www.jsof-tech.com/disclosures/dnspooq/

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-25685

Trust: 2.0

url:https://security.gentoo.org/glsa/202101-17

Trust: 1.8

url:https://www.debian.org/security/2021/dsa-4844

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61

Trust: 1.7

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 1.1

url:https://www.kb.cert.org/vuls/id/434904

Trust: 1.0

url:https://jvn.jp/vu/jvnvu90340376/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25686

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-25684

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 0.6

url:https://packetstormsecurity.com/files/161281/red-hat-security-advisory-2021-0401-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161535/ubuntu-security-notice-usn-4698-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161085/gentoo-linux-security-advisory-202101-17.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0699

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0864

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210120-01-dnspooq-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0283/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0692

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1088

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0420

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070106

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0231/

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-privileged-identity-manager-is-affected-by-security-vulnerabilities-cve-2020-25684-cve-2020-25685-cve-2020-25686/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122911

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25685

Trust: 0.3

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-001

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25686

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25684

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-14834

Trust: 0.2

url:https://usn.ubuntu.com/4698-1

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/326.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0156

Trust: 0.1

url:https://github.com/knqyf263/dnspooq

Trust: 0.1

url:https://security.archlinux.org/cve-2020-25685

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.8

Trust: 0.1

url:https://usn.ubuntu.com/4698-2

Trust: 0.1

url:https://launchpad.net/bugs/1916462

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.2

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0401

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0240

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0155

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.7

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25682

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25681

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25683

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: CNVD: CNVD-2021-16430 // VULMON: CVE-2020-25685 // PACKETSTORM: 161535 // PACKETSTORM: 161281 // PACKETSTORM: 161100 // PACKETSTORM: 161020 // PACKETSTORM: 161010 // PACKETSTORM: 161085 // CNNVD: CNNVD-202101-1574 // JVNDB: JVNDB-2020-015548 // NVD: CVE-2020-25685

CREDITS

Ubuntu

Trust: 0.8

sources: PACKETSTORM: 161535 // PACKETSTORM: 161010 // CNNVD: CNNVD-202101-1574

SOURCES

db:CNVDid:CNVD-2021-16430
db:VULMONid:CVE-2020-25685
db:PACKETSTORMid:161535
db:PACKETSTORMid:161281
db:PACKETSTORMid:161100
db:PACKETSTORMid:161020
db:PACKETSTORMid:161010
db:PACKETSTORMid:161085
db:CNNVDid:CNNVD-202101-1574
db:JVNDBid:JVNDB-2020-015548
db:NVDid:CVE-2020-25685

LAST UPDATE DATE

2026-02-07T21:52:24.120000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-16430date:2021-07-15T00:00:00
db:VULMONid:CVE-2020-25685date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202101-1574date:2022-10-08T00:00:00
db:JVNDBid:JVNDB-2020-015548date:2021-10-04T08:30:00
db:NVDid:CVE-2020-25685date:2025-11-04T20:15:57.363

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-16430date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25685date:2021-01-20T00:00:00
db:PACKETSTORMid:161535date:2021-02-25T15:26:41
db:PACKETSTORMid:161281date:2021-02-03T16:36:53
db:PACKETSTORMid:161100date:2021-01-25T17:28:49
db:PACKETSTORMid:161020date:2021-01-19T14:46:21
db:PACKETSTORMid:161010date:2021-01-19T14:43:50
db:PACKETSTORMid:161085date:2021-01-25T14:38:26
db:CNNVDid:CNNVD-202101-1574date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2020-015548date:2021-10-04T00:00:00
db:NVDid:CVE-2020-25685date:2021-01-20T16:15:14.303