Debian Security Advisory 3251-1

Discussion in 'News Aggregator' started by Packet Storm, 6 May 2015.

  1. Packet Storm

    Packet Storm Guest

    Debian Linux Security Advisory 3251-1 - Nick Sampanis discovered that dnsmasq, a small caching DNS proxy and DHCP/TFTP server, did not properly check the return value of the setup_reply() function called during a TCP connection, which is used then as a size argument in a function which writes data on the client's connection. A remote attacker could exploit this issue via a specially crafted DNS request to cause dnsmasq to crash, or potentially to obtain sensitive information from process memory.

    Continue reading...
     

Share This Page

Loading...