DHCP: DNSmasq DHCPv6 Stack Buffer Overflow

A stack-based buffer overflow has been reported in the DHCPv6 component of dnsmasq. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted packet to the target server. Successful exploitation of this vulnerability could result in execution of arbitrary code on the target server with administrative privileges.

Extended Description

Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.

Affected Products

Thekelleys dnsmasq

Short Name
DHCP:DHCPV6-STACK-BOF
Severity
Major
Recommended
True
Recommended Action
Drop
Category
DHCP
Keywords
Buffer CVE-2017-14493 DHCPv6 DNSmasq Overflow Stack
Release Date
10/13/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
Port
UDP/547
False Positive
Unknown
Vendors

Opensuse

Thekelleys

Debian

Redhat

Canonical

CVSS Score

7.5

Found a potential security threat?