Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:thekelleys:dnsmasq:2.85:rc3:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-50387 |
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records. Published: February 14, 2024; 11:15:45 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-28450 |
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020. Published: March 15, 2023; 5:15:09 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-0934 |
A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service. Published: August 29, 2022; 11:15:10 AM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |