U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-14491

Change History

Modified Analysis by NIST 4/22/2022 4:39:50 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:nvidia:geforce_experience:*:*:*:*:*:*:*:* versions from (including) 3.0 up to (excluding) 3.10.0.55
     OR
          cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:huawei:honor_v9_play_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jimmy-al00ac00b135
     OR
          cpe:2.3:h:huawei:honor_v9_play:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:nvidia:linux_for_tegra:*:*:*:*:*:*:*:* versions up to (excluding) r21.6
     OR
          cpe:2.3:h:nvidia:jetson_tk1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:nvidia:linux_for_tegra:*:*:*:*:*:*:*:* versions up to (excluding) r24.2.2
     OR
          cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:ruggedcom_rm1224_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.0
     OR
          cpe:2.3:h:siemens:ruggedcom_rm1224:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.0
     OR
          cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 5.0
     OR
          cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 6.5.1.5
     OR
          cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
     *cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
     *cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:synology:diskstation_manager:5.2:*:*:*:*:*:*:*
     *cpe:2.3:a:synology:diskstation_manager:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:synology:router_manager:1.1:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions up to (including) 4.15
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.16 up to (excluding) 4.16.13m
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.17 up to (excluding) 4.17.8m
     *cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:* versions from (including) 4.18 up to (including) 4.18.4.2f
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* versions from (including) 6.3.1 up to (excluding) 6.3.1.25
     *cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* versions from (including) 6.4.4.0 up to (excluding) 6.4.4.16
     *cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* versions from (including) 6.5.0.0 up to (excluding) 6.5.1.9
     *cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* versions from (including) 6.5.3.0 up to (excluding) 6.5.3.3
     *cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* versions from (including) 6.5.4.0 up to (excluding) 6.5.4.2
     *cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* versions from (including) 8.1.0.0 up to (excluding) 8.1.0.4
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Removed CPE Configuration
OR
     *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:o:novell:leap:42.2:*:*:*:*:*:*:*
     *cpe:2.3:o:novell:leap:42.3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

								
						
Removed CVSS V3
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
NIST CWE-787
Removed CWE
NIST CWE-119

								
						
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00003.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00004.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00005.html Mailing List, Third Party Advisory
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html Mailing List, Third Party Advisory
Changed Reference Type
http://nvidia.custhelp.com/app/answers/detail/a_id/4560 No Types Assigned
http://nvidia.custhelp.com/app/answers/detail/a_id/4560 Third Party Advisory
Changed Reference Type
http://nvidia.custhelp.com/app/answers/detail/a_id/4561 No Types Assigned
http://nvidia.custhelp.com/app/answers/detail/a_id/4561 Third Party Advisory
Changed Reference Type
http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html No Types Assigned
http://packetstormsecurity.com/files/144480/Dnsmasq-2-Byte-Heap-Based-Overflow.html Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc Patch, Vendor Advisory
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc Mailing List, Patch, Vendor Advisory
Changed Reference Type
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt No Types Assigned
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt Third Party Advisory
Changed Reference Type
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en No Types Assigned
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20171103-01-dnsmasq-en Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/101085 Third Party Advisory, VDB Entry
http://www.securityfocus.com/bid/101085 Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/101977 No Types Assigned
http://www.securityfocus.com/bid/101977 Broken Link
Changed Reference Type
http://www.securitytracker.com/id/1039474 Third Party Advisory, VDB Entry
http://www.securitytracker.com/id/1039474 Broken Link
Changed Reference Type
http://www.ubuntu.com/usn/USN-3430-3 No Types Assigned
http://www.ubuntu.com/usn/USN-3430-3 Third Party Advisory
Changed Reference Type
https://access.redhat.com/security/vulnerabilities/3199382 Issue Tracking, Third Party Advisory
https://access.redhat.com/security/vulnerabilities/3199382 Third Party Advisory
Changed Reference Type
https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf No Types Assigned
https://cert-portal.siemens.com/productcert/pdf/ssa-689071.pdf Patch, Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/527KNN34RN2SB6MBJG7CKSEBWYE3TJEB/ Mailing List, Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5MMPCJOYPPL4B5RBY4U425PWG7EETDTD/ Mailing List, Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/ No Types Assigned
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXRZ2W6TV6NLUJC5NOFBSG6PZSMDTYPV/ Mailing List, Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/201710-27 No Types Assigned
https://security.gentoo.org/glsa/201710-27 Third Party Advisory
Changed Reference Type
https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30 No Types Assigned
https://www.arista.com/en/support/advisories-notices/security-advisories/3577-security-advisory-30 Mitigation, Third Party Advisory
Changed Reference Type
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449 No Types Assigned
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449 Third Party Advisory
Changed Reference Type
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/ No Types Assigned
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-449/ Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2017/dsa-3989 No Types Assigned
https://www.debian.org/security/2017/dsa-3989 Third Party Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/42941/ Third Party Advisory, VDB Entry
https://www.exploit-db.com/exploits/42941/ Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq No Types Assigned
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq Third Party Advisory