CVE-2021-3448 PUBLISHED

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

EPSS 0.04% · 12.6th percentile

Risk Scores

EPSS Score
0.04%
12.6th percentile

Affected Products

VendorProductVersions
Ubuntu:20.04:LTSdnsmasq0, 2.80-1ubuntu2, 2.80-1ubuntu4
Ubuntu:18.04:LTSdnsmasq2.79-1ubuntu0.3, 0, 2.78-1
Ubuntu:Pro:16.04:LTSdnsmasq2.75-1ubuntu0.16.04.8, 2.75-1ubuntu0.16.04.10, 2.75-1ubuntu0.16.04.10+esm1
Ubuntu:Pro:14.04:LTSdnsmasq2.68-1ubuntu0.2, 2.68-1ubuntu0.2+esm2, 2.68-1ubuntu0.2+esm3

Timeline

References

Open in Interactive Console →