CVE-2015-3294 PUBLISHED

The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.

EPSS 0.18% · 39.9th percentile

Risk Scores

EPSS Score
0.18%
39.9th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSdnsmasq0, 2.66-4ubuntu1, 2.67-1

Timeline

References

Open in Interactive Console →