Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2017-14492
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.926
EPSS Ranking
99.7%
CVSS Severity
CVSS v3 Score
9.8
CVSS v2 Score
7.5
References
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4561
http://thekelleys.org.uk/dnsmasq/CHANGELOG
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=24036ea507862c7b7898b68289c8130f85599c10
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
http://www.debian.org/security/2017/dsa-3989
http://www.securityfocus.com/bid/101085
http://www.securitytracker.com/id/1039474
http://www.ubuntu.com/usn/USN-3430-1
http://www.ubuntu.com/usn/USN-3430-2
https://access.redhat.com/errata/RHSA-2017:2836
https://access.redhat.com/errata/RHSA-2017:2837
https://access.redhat.com/security/vulnerabilities/3199382
https://security.gentoo.org/glsa/201710-27
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
https://www.exploit-db.com/exploits/42942/
https://www.kb.cert.org/vuls/id/973527
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4561
http://thekelleys.org.uk/dnsmasq/CHANGELOG
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=24036ea507862c7b7898b68289c8130f85599c10
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-005.txt
http://www.debian.org/security/2017/dsa-3989
http://www.securityfocus.com/bid/101085
http://www.securitytracker.com/id/1039474
http://www.ubuntu.com/usn/USN-3430-1
http://www.ubuntu.com/usn/USN-3430-2
https://access.redhat.com/errata/RHSA-2017:2836
https://access.redhat.com/errata/RHSA-2017:2837
https://access.redhat.com/security/vulnerabilities/3199382
https://security.gentoo.org/glsa/201710-27
https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
https://www.exploit-db.com/exploits/42942/
https://www.kb.cert.org/vuls/id/973527
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11664.html
https://www.mail-archive.com/dnsmasq-discuss%40lists.thekelleys.org.uk/msg11665.html
https://www.synology.com/support/security/Synology_SA_17_59_Dnsmasq
Products affected by CVE-2017-14492
Thekelleys
»
Dnsmasq
»
Version:
N/A
cpe:2.3:a:thekelleys:dnsmasq:-
Thekelleys
»
Dnsmasq
»
Version:
0.4
cpe:2.3:a:thekelleys:dnsmasq:0.4
Thekelleys
»
Dnsmasq
»
Version:
0.5
cpe:2.3:a:thekelleys:dnsmasq:0.5
Thekelleys
»
Dnsmasq
»
Version:
0.6
cpe:2.3:a:thekelleys:dnsmasq:0.6
Thekelleys
»
Dnsmasq
»
Version:
0.7
cpe:2.3:a:thekelleys:dnsmasq:0.7
Thekelleys
»
Dnsmasq
»
Version:
0.95
cpe:2.3:a:thekelleys:dnsmasq:0.95
Thekelleys
»
Dnsmasq
»
Version:
0.96
cpe:2.3:a:thekelleys:dnsmasq:0.96
Thekelleys
»
Dnsmasq
»
Version:
0.98
cpe:2.3:a:thekelleys:dnsmasq:0.98
Thekelleys
»
Dnsmasq
»
Version:
0.992
cpe:2.3:a:thekelleys:dnsmasq:0.992
Thekelleys
»
Dnsmasq
»
Version:
0.996
cpe:2.3:a:thekelleys:dnsmasq:0.996
Thekelleys
»
Dnsmasq
»
Version:
1.0
cpe:2.3:a:thekelleys:dnsmasq:1.0
Thekelleys
»
Dnsmasq
»
Version:
1.10
cpe:2.3:a:thekelleys:dnsmasq:1.10
Thekelleys
»
Dnsmasq
»
Version:
1.11
cpe:2.3:a:thekelleys:dnsmasq:1.11
Thekelleys
»
Dnsmasq
»
Version:
1.12
cpe:2.3:a:thekelleys:dnsmasq:1.12
Thekelleys
»
Dnsmasq
»
Version:
1.13
cpe:2.3:a:thekelleys:dnsmasq:1.13
Thekelleys
»
Dnsmasq
»
Version:
1.14
cpe:2.3:a:thekelleys:dnsmasq:1.14
Thekelleys
»
Dnsmasq
»
Version:
1.15
cpe:2.3:a:thekelleys:dnsmasq:1.15
Thekelleys
»
Dnsmasq
»
Version:
1.16
cpe:2.3:a:thekelleys:dnsmasq:1.16
Thekelleys
»
Dnsmasq
»
Version:
1.17
cpe:2.3:a:thekelleys:dnsmasq:1.17
Thekelleys
»
Dnsmasq
»
Version:
1.18
cpe:2.3:a:thekelleys:dnsmasq:1.18
Thekelleys
»
Dnsmasq
»
Version:
1.2
cpe:2.3:a:thekelleys:dnsmasq:1.2
Thekelleys
»
Dnsmasq
»
Version:
1.3
cpe:2.3:a:thekelleys:dnsmasq:1.3
Thekelleys
»
Dnsmasq
»
Version:
1.4
cpe:2.3:a:thekelleys:dnsmasq:1.4
Thekelleys
»
Dnsmasq
»
Version:
1.5
cpe:2.3:a:thekelleys:dnsmasq:1.5
Thekelleys
»
Dnsmasq
»
Version:
1.6
cpe:2.3:a:thekelleys:dnsmasq:1.6
Thekelleys
»
Dnsmasq
»
Version:
1.7
cpe:2.3:a:thekelleys:dnsmasq:1.7
Thekelleys
»
Dnsmasq
»
Version:
1.8
cpe:2.3:a:thekelleys:dnsmasq:1.8
Thekelleys
»
Dnsmasq
»
Version:
1.9
cpe:2.3:a:thekelleys:dnsmasq:1.9
Thekelleys
»
Dnsmasq
»
Version:
2.0
cpe:2.3:a:thekelleys:dnsmasq:2.0
Thekelleys
»
Dnsmasq
»
Version:
2.1
cpe:2.3:a:thekelleys:dnsmasq:2.1
Thekelleys
»
Dnsmasq
»
Version:
2.10
cpe:2.3:a:thekelleys:dnsmasq:2.10
Thekelleys
»
Dnsmasq
»
Version:
2.11
cpe:2.3:a:thekelleys:dnsmasq:2.11
Thekelleys
»
Dnsmasq
»
Version:
2.12
cpe:2.3:a:thekelleys:dnsmasq:2.12
Thekelleys
»
Dnsmasq
»
Version:
2.13
cpe:2.3:a:thekelleys:dnsmasq:2.13
Thekelleys
»
Dnsmasq
»
Version:
2.14
cpe:2.3:a:thekelleys:dnsmasq:2.14
Thekelleys
»
Dnsmasq
»
Version:
2.15
cpe:2.3:a:thekelleys:dnsmasq:2.15
Thekelleys
»
Dnsmasq
»
Version:
2.16
cpe:2.3:a:thekelleys:dnsmasq:2.16
Thekelleys
»
Dnsmasq
»
Version:
2.17
cpe:2.3:a:thekelleys:dnsmasq:2.17
Thekelleys
»
Dnsmasq
»
Version:
2.18
cpe:2.3:a:thekelleys:dnsmasq:2.18
Thekelleys
»
Dnsmasq
»
Version:
2.19
cpe:2.3:a:thekelleys:dnsmasq:2.19
Thekelleys
»
Dnsmasq
»
Version:
2.2
cpe:2.3:a:thekelleys:dnsmasq:2.2
Thekelleys
»
Dnsmasq
»
Version:
2.20
cpe:2.3:a:thekelleys:dnsmasq:2.20
Thekelleys
»
Dnsmasq
»
Version:
2.21
cpe:2.3:a:thekelleys:dnsmasq:2.21
Thekelleys
»
Dnsmasq
»
Version:
2.22
cpe:2.3:a:thekelleys:dnsmasq:2.22
Thekelleys
»
Dnsmasq
»
Version:
2.23
cpe:2.3:a:thekelleys:dnsmasq:2.23
Thekelleys
»
Dnsmasq
»
Version:
2.24
cpe:2.3:a:thekelleys:dnsmasq:2.24
Thekelleys
»
Dnsmasq
»
Version:
2.25
cpe:2.3:a:thekelleys:dnsmasq:2.25
Thekelleys
»
Dnsmasq
»
Version:
2.26
cpe:2.3:a:thekelleys:dnsmasq:2.26
Thekelleys
»
Dnsmasq
»
Version:
2.27
cpe:2.3:a:thekelleys:dnsmasq:2.27
Thekelleys
»
Dnsmasq
»
Version:
2.28
cpe:2.3:a:thekelleys:dnsmasq:2.28
Thekelleys
»
Dnsmasq
»
Version:
2.29
cpe:2.3:a:thekelleys:dnsmasq:2.29
Thekelleys
»
Dnsmasq
»
Version:
2.3
cpe:2.3:a:thekelleys:dnsmasq:2.3
Thekelleys
»
Dnsmasq
»
Version:
2.30
cpe:2.3:a:thekelleys:dnsmasq:2.30
Thekelleys
»
Dnsmasq
»
Version:
2.31
cpe:2.3:a:thekelleys:dnsmasq:2.31
Thekelleys
»
Dnsmasq
»
Version:
2.33
cpe:2.3:a:thekelleys:dnsmasq:2.33
Thekelleys
»
Dnsmasq
»
Version:
2.34
cpe:2.3:a:thekelleys:dnsmasq:2.34
Thekelleys
»
Dnsmasq
»
Version:
2.35
cpe:2.3:a:thekelleys:dnsmasq:2.35
Thekelleys
»
Dnsmasq
»
Version:
2.36
cpe:2.3:a:thekelleys:dnsmasq:2.36
Thekelleys
»
Dnsmasq
»
Version:
2.37
cpe:2.3:a:thekelleys:dnsmasq:2.37
Thekelleys
»
Dnsmasq
»
Version:
2.38
cpe:2.3:a:thekelleys:dnsmasq:2.38
Thekelleys
»
Dnsmasq
»
Version:
2.39
cpe:2.3:a:thekelleys:dnsmasq:2.39
Thekelleys
»
Dnsmasq
»
Version:
2.4
cpe:2.3:a:thekelleys:dnsmasq:2.4
Thekelleys
»
Dnsmasq
»
Version:
2.40
cpe:2.3:a:thekelleys:dnsmasq:2.40
Thekelleys
»
Dnsmasq
»
Version:
2.41
cpe:2.3:a:thekelleys:dnsmasq:2.41
Thekelleys
»
Dnsmasq
»
Version:
2.42
cpe:2.3:a:thekelleys:dnsmasq:2.42
Thekelleys
»
Dnsmasq
»
Version:
2.43
cpe:2.3:a:thekelleys:dnsmasq:2.43
Thekelleys
»
Dnsmasq
»
Version:
2.44
cpe:2.3:a:thekelleys:dnsmasq:2.44
Thekelleys
»
Dnsmasq
»
Version:
2.45
cpe:2.3:a:thekelleys:dnsmasq:2.45
Thekelleys
»
Dnsmasq
»
Version:
2.46
cpe:2.3:a:thekelleys:dnsmasq:2.46
Thekelleys
»
Dnsmasq
»
Version:
2.47
cpe:2.3:a:thekelleys:dnsmasq:2.47
Thekelleys
»
Dnsmasq
»
Version:
2.48
cpe:2.3:a:thekelleys:dnsmasq:2.48
Thekelleys
»
Dnsmasq
»
Version:
2.49
cpe:2.3:a:thekelleys:dnsmasq:2.49
Thekelleys
»
Dnsmasq
»
Version:
2.5
cpe:2.3:a:thekelleys:dnsmasq:2.5
Thekelleys
»
Dnsmasq
»
Version:
2.50
cpe:2.3:a:thekelleys:dnsmasq:2.50
Thekelleys
»
Dnsmasq
»
Version:
2.51
cpe:2.3:a:thekelleys:dnsmasq:2.51
Thekelleys
»
Dnsmasq
»
Version:
2.52
cpe:2.3:a:thekelleys:dnsmasq:2.52
Thekelleys
»
Dnsmasq
»
Version:
2.53
cpe:2.3:a:thekelleys:dnsmasq:2.53
Thekelleys
»
Dnsmasq
»
Version:
2.54
cpe:2.3:a:thekelleys:dnsmasq:2.54
Thekelleys
»
Dnsmasq
»
Version:
2.55
cpe:2.3:a:thekelleys:dnsmasq:2.55
Thekelleys
»
Dnsmasq
»
Version:
2.56
cpe:2.3:a:thekelleys:dnsmasq:2.56
Thekelleys
»
Dnsmasq
»
Version:
2.57
cpe:2.3:a:thekelleys:dnsmasq:2.57
Thekelleys
»
Dnsmasq
»
Version:
2.58
cpe:2.3:a:thekelleys:dnsmasq:2.58
Thekelleys
»
Dnsmasq
»
Version:
2.59
cpe:2.3:a:thekelleys:dnsmasq:2.59
Thekelleys
»
Dnsmasq
»
Version:
2.6
cpe:2.3:a:thekelleys:dnsmasq:2.6
Thekelleys
»
Dnsmasq
»
Version:
2.60
cpe:2.3:a:thekelleys:dnsmasq:2.60
Thekelleys
»
Dnsmasq
»
Version:
2.61
cpe:2.3:a:thekelleys:dnsmasq:2.61
Thekelleys
»
Dnsmasq
»
Version:
2.62
cpe:2.3:a:thekelleys:dnsmasq:2.62
Thekelleys
»
Dnsmasq
»
Version:
2.63
cpe:2.3:a:thekelleys:dnsmasq:2.63
Thekelleys
»
Dnsmasq
»
Version:
2.64
cpe:2.3:a:thekelleys:dnsmasq:2.64
Thekelleys
»
Dnsmasq
»
Version:
2.65
cpe:2.3:a:thekelleys:dnsmasq:2.65
Thekelleys
»
Dnsmasq
»
Version:
2.66
cpe:2.3:a:thekelleys:dnsmasq:2.66
Thekelleys
»
Dnsmasq
»
Version:
2.67
cpe:2.3:a:thekelleys:dnsmasq:2.67
Thekelleys
»
Dnsmasq
»
Version:
2.68
cpe:2.3:a:thekelleys:dnsmasq:2.68
Thekelleys
»
Dnsmasq
»
Version:
2.69
cpe:2.3:a:thekelleys:dnsmasq:2.69
Thekelleys
»
Dnsmasq
»
Version:
2.7
cpe:2.3:a:thekelleys:dnsmasq:2.7
Thekelleys
»
Dnsmasq
»
Version:
2.70
cpe:2.3:a:thekelleys:dnsmasq:2.70
Thekelleys
»
Dnsmasq
»
Version:
2.71
cpe:2.3:a:thekelleys:dnsmasq:2.71
Thekelleys
»
Dnsmasq
»
Version:
2.72
cpe:2.3:a:thekelleys:dnsmasq:2.72
Thekelleys
»
Dnsmasq
»
Version:
2.73
cpe:2.3:a:thekelleys:dnsmasq:2.73
Thekelleys
»
Dnsmasq
»
Version:
2.74
cpe:2.3:a:thekelleys:dnsmasq:2.74
Thekelleys
»
Dnsmasq
»
Version:
2.75
cpe:2.3:a:thekelleys:dnsmasq:2.75
Thekelleys
»
Dnsmasq
»
Version:
2.76
cpe:2.3:a:thekelleys:dnsmasq:2.76
Thekelleys
»
Dnsmasq
»
Version:
2.77
cpe:2.3:a:thekelleys:dnsmasq:2.77
Thekelleys
»
Dnsmasq
»
Version:
2.8
cpe:2.3:a:thekelleys:dnsmasq:2.8
Thekelleys
»
Dnsmasq
»
Version:
2.9
cpe:2.3:a:thekelleys:dnsmasq:2.9
Canonical
»
Ubuntu Linux
»
Version:
14.04
cpe:2.3:o:canonical:ubuntu_linux:14.04
Canonical
»
Ubuntu Linux
»
Version:
16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04
Canonical
»
Ubuntu Linux
»
Version:
17.04
cpe:2.3:o:canonical:ubuntu_linux:17.04
Debian
»
Debian Linux
»
Version:
7.0
cpe:2.3:o:debian:debian_linux:7.0
Debian
»
Debian Linux
»
Version:
7.1
cpe:2.3:o:debian:debian_linux:7.1
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Novell
»
Leap
»
Version:
42.2
cpe:2.3:o:novell:leap:42.2
Novell
»
Leap
»
Version:
42.3
cpe:2.3:o:novell:leap:42.3
Redhat
»
Enterprise Linux Desktop
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
Redhat
»
Enterprise Linux Server
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_server:7.0
Redhat
»
Enterprise Linux Workstation
»
Version:
7.0
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved