Vulnerabilities > CVE-2017-15107 - Unspecified vulnerability in Thekelleys Dnsmasq

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
HIGH
Availability impact
NONE
network
low complexity
thekelleys
nessus

Summary

A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.

Vulnerable Configurations

Part Description Count
Application
Thekelleys
106

Nessus

  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2018-2_0-0017_DNSMASQ.NASL
    descriptionAn update of the dnsmasq package has been released.
    last seen2020-03-17
    modified2019-02-07
    plugin id121920
    published2019-02-07
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121920
    titlePhoton OS 2.0: Dnsmasq PHSA-2018-2.0-0017
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2018-1_0-0109_LIBTASN1.NASL
    descriptionAn update of the libtasn1 package has been released.
    last seen2020-03-17
    modified2019-02-07
    plugin id121811
    published2019-02-07
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121811
    titlePhoton OS 1.0: Libtasn1 PHSA-2018-1.0-0109
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2018-1_0-0109.NASL
    descriptionAn update of 'libtasn1', 'dnsmasq' packages of Photon OS has been released.
    last seen2019-02-21
    modified2019-02-07
    plugin id111920
    published2018-08-17
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=111920
    titlePhoton OS 1.0: Dnsmasq / Libtasn1 PHSA-2018-1.0-0109 (deprecated)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-FBE4017846.NASL
    descriptionDNSSEC fix for wildcard NSEC records (CVE-2017-15107) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2018-01-31
    plugin id106522
    published2018-01-31
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106522
    titleFedora 27 : dnsmasq (2018-fbe4017846)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-2669.NASL
    descriptionThis update for dnsmasq fixes the following issues : Security issues fixed: 	 - CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers to cause denial of service via DHCP response creation (bsc#1154849) - CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance (bsc#1076958). Other issues addressed : - Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543). - Removed cache size limit (bsc#1138743). - bsc#1152539: include config files from /etc/dnsmasq.d/*.conf . This update was imported from the SUSE:SLE-15-SP1:Update update project.
    last seen2020-05-09
    modified2019-12-12
    plugin id131994
    published2019-12-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131994
    titleopenSUSE Security Update : dnsmasq (openSUSE-2019-2669)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1721-1.NASL
    descriptionThis update for dnsmasq fixes the following issues : Security issue fixed : CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance. (bsc#1076958) Non-security issue fixed: Reload system dbus to pick up policy change on install (bsc#1054429). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126460
    published2019-07-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126460
    titleSUSE SLED12 / SLES12 Security Update : dnsmasq (SUSE-SU-2019:1721-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1595.NASL
    descriptionAccording to the version of the dnsmasq packages installed, the EulerOS installation on the remote host is affected by the following vulnerability : - A vulnerability was found in the implementation of DNSSEC in Dnsmasq up to and including 2.78. Wildcard synthesized NSEC records could be improperly interpreted to prove the non-existence of hostnames that actually exist.(CVE-2017-15107) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-06
    modified2020-06-02
    plugin id137013
    published2020-06-02
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/137013
    titleEulerOS 2.0 SP5 : dnsmasq (EulerOS-SA-2020-1595)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-3188-1.NASL
    descriptionThis update for dnsmasq fixes the following issues : Security issues fixed : CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers to cause denial of service via DHCP response creation (bsc#1154849) CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance (bsc#1076958). Other issues addressed: Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543). Removed cache size limit (bsc#1138743). Included config files from /etc/dnsmasq.d/*.conf (bsc#1152539). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-09
    modified2019-12-06
    plugin id131757
    published2019-12-06
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131757
    titleSUSE SLED15 / SLES15 Security Update : dnsmasq (SUSE-SU-2019:3188-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2020-1530.NASL
    descriptionAccording to the versions of the dnsmasq packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - A vulnerability was found in dnsmasq before version 2.81, where the memory leak allows remote attackers to cause a denial of service (memory consumption) via vectors involving DHCP response creation.(CVE-2019-14834) - A vulnerability was found in Dnsmasq
    last seen2020-05-09
    modified2020-05-01
    plugin id136233
    published2020-05-01
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136233
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : dnsmasq (EulerOS-SA-2020-1530)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2018-9780220F7D.NASL
    descriptionDNSSEC fix for wildcard NSEC records (CVE-2017-15107) Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2018-02-07
    plugin id106640
    published2018-02-07
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106640
    titleFedora 26 : dnsmasq (2018-9780220f7d)
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2018-1_0-0109_DNSMASQ.NASL
    descriptionAn update of the dnsmasq package has been released.
    last seen2020-03-17
    modified2019-02-07
    plugin id121810
    published2019-02-07
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/121810
    titlePhoton OS 1.0: Dnsmasq PHSA-2018-1.0-0109
  • NASL familyPhotonOS Local Security Checks
    NASL idPHOTONOS_PHSA-2018-2_0-0017.NASL
    descriptionAn update of {'libtasn1', 'libtiff', 'dnsmasq'} packages of Photon OS has been released.
    last seen2019-02-21
    modified2019-02-07
    plugin id111287
    published2018-07-24
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=111287
    titlePhoton OS 2.0 : libtasn1 / libtiff / dnsmasq (PhotonOS-PHSA-2018-2.0-0017) (deprecated)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-3189-1.NASL
    descriptionThis update for dnsmasq fixes the following issues : Security issues fixed : CVE-2019-14834: Fixed a memory leak which could have allowed to remote attackers to cause denial of service via DHCP response creation (bsc#1154849) CVE-2017-15107: Fixed a vulnerability in DNSSEC implementation. Processing of wildcard synthesized NSEC records may result improper validation for non-existance (bsc#1076958). Other issues addressed: Included linux/sockios.h to get SIOCGSTAMP (bsc#1156543). Removed cache size limit (bsc#1138743). bsc#1152539: include config files from /etc/dnsmasq.d/*.conf . Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-09
    modified2019-12-06
    plugin id131758
    published2019-12-06
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/131758
    titleSUSE SLED15 / SLES15 Security Update : dnsmasq (SUSE-SU-2019:3189-1)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1174.NASL
    descriptionAccording to the versions of the dnsmasq packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the DNS code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash.i1/4^CVE-2017-13704i1/4%0 - A vulnerability was found in Dnsmasq
    last seen2020-03-19
    modified2019-04-09
    plugin id123860
    published2019-04-09
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123860
    titleEulerOS Virtualization 2.5.3 : dnsmasq (EulerOS-SA-2019-1174)