ALPINE-CVE-2021-3448 PUBLISHED CVSS 4 MEDIUM

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

Risk Scores

CVSS v3.1
4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

Affected Products

VendorProductVersions
Alpine:v3.17dnsmasq0, 0, 0
Alpine:v3.19dnsmasq0, 0, 0
Alpine:v3.18dnsmasq0, 0, 0
Alpine:v3.13dnsmasq2.59-r1, 2.59-r0, 2.58-r0
Alpine:v3.16dnsmasq0, 0, 0
Alpine:v3.15dnsmasq0, 0, 0
Alpine:v3.22dnsmasq0, 0, 0
Alpine:v3.21dnsmasq0, 0, 0
Alpine:v3.14dnsmasq2.52-r0, 2.84-r0, 2.83-r0
Alpine:v3.10dnsmasq0, 2.46-r0, 2.47-r0
Alpine:v3.12dnsmasq2.81-r0, 2.80-r5, 2.80-r4
Alpine:v3.11dnsmasq2.76-r3, 2.83-r0, 2.80-r5
Alpine:v3.23dnsmasq0, 0, 0
Alpine:v3.20dnsmasq0, 0, 0

Timeline

References

Open in Interactive Console →