ID

VAR-202101-0220


CVE

CVE-2020-25684


TITLE

Dnsmasq is vulnerable to memory corruption and cache poisoning

Trust: 0.8

sources: CERT/CC: VU#434904

DESCRIPTION

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.CVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not AffectedCVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not Affected. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. ========================================================================== Ubuntu Security Notice USN-4698-2 February 24, 2021 dnsmasq regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN-4698-1 introduced regressions in Dnsmasq. Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server Details: USN-4698-1 fixed vulnerabilities in Dnsmasq. The updates introduced regressions in certain environments related to issues with multiple queries, and issues with retries. Original advisory details: Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled memory when sorting RRsets. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25681, CVE-2020-25687) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled extracting certain names. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25682, CVE-2020-25683) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented address/port checks. (CVE-2020-25684) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented query resource name checks. (CVE-2020-25685) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled multiple query requests for the same resource name. (CVE-2020-25686) It was discovered that Dnsmasq incorrectly handled memory during DHCP response creation. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2019-14834) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: dnsmasq 2.82-1ubuntu1.2 dnsmasq-base 2.82-1ubuntu1.2 dnsmasq-utils 2.82-1ubuntu1.2 Ubuntu 20.04 LTS: dnsmasq 2.80-1.1ubuntu1.3 dnsmasq-base 2.80-1.1ubuntu1.3 dnsmasq-utils 2.80-1.1ubuntu1.3 Ubuntu 18.04 LTS: dnsmasq 2.79-1ubuntu0.3 dnsmasq-base 2.79-1ubuntu0.3 dnsmasq-utils 2.79-1ubuntu0.3 Ubuntu 16.04 LTS: dnsmasq 2.75-1ubuntu0.16.04.8 dnsmasq-base 2.75-1ubuntu0.16.04.8 dnsmasq-utils 2.75-1ubuntu0.16.04.8 After a standard system update you need to reboot your computer to make all the necessary changes. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Bug Fix(es): * Previously, the Red Hat Virtualization Host (RHV-H) repository (rhvh-4-for-rhel-8-x86_64-rpms) did not include the libsmbclient package, which is a dependency for the sssd-ad package. Consequently, the sssd-ad package failed to install. With this update, the libsmbclient is now in the RHV-H repository, and sssd-ad now installs on RHV-H. (BZ#1868967) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: dnsmasq security update Advisory ID: RHSA-2021:0153-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0153 Issue date: 2021-01-19 CVE Names: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 ==================================================================== 1. Summary: An update for dnsmasq is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Security Fix(es): * dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) * dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) * dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm ppc64: dnsmasq-2.76-16.el7_9.1.ppc64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm ppc64le: dnsmasq-2.76-16.el7_9.1.ppc64le.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm s390x: dnsmasq-2.76-16.el7_9.1.s390x.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64.rpm dnsmasq-utils-2.76-16.el7_9.1.ppc64.rpm ppc64le: dnsmasq-debuginfo-2.76-16.el7_9.1.ppc64le.rpm dnsmasq-utils-2.76-16.el7_9.1.ppc64le.rpm s390x: dnsmasq-debuginfo-2.76-16.el7_9.1.s390x.rpm dnsmasq-utils-2.76-16.el7_9.1.s390x.rpm x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: dnsmasq-2.76-16.el7_9.1.src.rpm x86_64: dnsmasq-2.76-16.el7_9.1.x86_64.rpm dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: dnsmasq-debuginfo-2.76-16.el7_9.1.x86_64.rpm dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2021-001 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYAblHdzjgjWX9erEAQg6Xg//fXZBawqLgCXhC7jToJJgUA+WoERkMbil Vs5+OP4vp+nT2iA92mQ84rLTQG2tL2xhPfMxLVl+9aCH44RjJjmQ8F/ODvYxRCe4 MopmumQIwfGMAFK/n16jHAmkg+qMZa3ehUp+LuawnsIuGtC7BmiohLTZqjxFj754 6h79AhB8/zeX1buyqEBgo8kCTy/L+TRW/Xg/ENi6a6NTnwG3f2n89oxUOCASm2cA YF2Qc1L8yqd/5YXBA8E3gRouBe2caThWUo0qrG9ois7lYIJKlxzo9sq3n6qfc8bN hZ/OAKvNSnRSrC4AW8kHVskv0hR8kC+iX05ryujBdGRLiafHl9hLGy2E0qRR3mm3 hNyjhKzBNxwZZ3gF8nOQJyWtxSYJSwbl6n01ElEs+QexMKi/f+x8hML1BS1rf/tG JuOOyLTUGjWIdmmLEKNQa/A5h0rWwJhNhVKuK+iNGXTey8C1JmeNaYpeOn8JdK1E iS8ZT48mfu8MxvGVVbv8ARfMQtsWSo1IOMD/ttUh2SPflZ1Qpd2sGTR5sIJrq2JD XlWePyzEQSL0UEJ8FgYOeJJEt9Q/gWgiug7ZBZrmanzLaNv0DA0dLsD8kE/p2mml j6kxe9R0XnpTxnDTzKmmCaEXCFsrJIg872+57VfVbCeFcwV6pZMNMFACmMI6DJgX sGV/jc2cn78=iw2j -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 8.1) - aarch64, ppc64le, s390x, x86_64 3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202101-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: January 22, 2021 Bugs: #766126 ID: 202101-17 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Dnsmasq, the worst of which may allow remote attackers to execute arbitrary code. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/dnsmasq < 2.83 >= 2.83 Description =========== Multiple vulnerabilities have been discovered in Dnsmasq. Workaround ========== There is no known workaround at this time. Resolution ========== All Dnsmasq users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.83" References ========== [ 1 ] CVE-2020-25681 https://nvd.nist.gov/vuln/detail/CVE-2020-25681 [ 2 ] CVE-2020-25682 https://nvd.nist.gov/vuln/detail/CVE-2020-25682 [ 3 ] CVE-2020-25683 https://nvd.nist.gov/vuln/detail/CVE-2020-25683 [ 4 ] CVE-2020-25684 https://nvd.nist.gov/vuln/detail/CVE-2020-25684 [ 5 ] CVE-2020-25685 https://nvd.nist.gov/vuln/detail/CVE-2020-25685 [ 6 ] CVE-2020-25686 https://nvd.nist.gov/vuln/detail/CVE-2020-25686 [ 7 ] CVE-2020-25687 https://nvd.nist.gov/vuln/detail/CVE-2020-25687 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202101-17 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2021 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . For the stable distribution (buster), these problems have been fixed in version 2.80-1+deb10u1. For the detailed security status of dnsmasq please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dnsmasq Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAZVA4ACgkQEL6Jg/PV nWQYKAgAgVwonRAgXSliaFh0n44OPOz9wf4KibG7otcnAx4V4XqFAeXsHd/hIX/K IC313F3I+8WzvjKBhvt2KnGG9SnoTnq4roBIa1nz//vNX0hyfDm5xPlxQOExzC+c YS8kGt++SvC2wgOsrZEjyk0ecKqDJmZSwW31zXG9/2kTzCbKjuDp+i4TTADqabPC AgbmEGVKBR2Fk7K9Prct27oWoj7LHMaH+Ttb8uQGnG7OgJs9KyRI+2qIu+VaRCGf yfRj+XayPYHV1Amf5dLIKcLMMp/FnkNFoO2YIAZkWVPjXD2uPKUykJJ1GRl8R+0q qtNhPTNNuD6WnYzC8yP0KIQ2tsbg9Q== =j5Ka -----END PGP SIGNATURE-----

Trust: 2.97

sources: NVD: CVE-2020-25684 // CERT/CC: VU#434904 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 161535 // PACKETSTORM: 161281 // PACKETSTORM: 161100 // PACKETSTORM: 161017 // PACKETSTORM: 161013 // PACKETSTORM: 161085 // PACKETSTORM: 161014 // PACKETSTORM: 169002

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-16431

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.24

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.21.14m

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.25

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.21

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.22

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.23.7m

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.24.5m

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.23

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.25.2f

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.22.9m

Trust: 1.0

vendor:thekelleysmodel:dnsmasqscope:ltversion:2.83

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.83

Trust: 0.6

sources: CNVD: CNVD-2021-16431 // NVD: CVE-2020-25684

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-25684
value: LOW

Trust: 1.0

CNVD: CNVD-2021-16431
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-25684
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-25684
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2021-16431
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-25684
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // NVD: CVE-2020-25684

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-358

Trust: 1.0

sources: NVD: CVE-2020-25684

THREAT TYPE

remote

Trust: 0.2

sources: PACKETSTORM: 161535 // PACKETSTORM: 161085

TYPE

arbitrary

Trust: 0.3

sources: PACKETSTORM: 161535 // PACKETSTORM: 161085 // PACKETSTORM: 169002

PATCH

title:Patch for Dnsmasq security feature issue vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/251931

Trust: 0.6

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210156 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210240 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210245 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210153 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210154 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210155 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210401 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210395 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210151 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210150 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210152 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-25684 log

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1587url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1587

Trust: 0.1

title:Debian Security Advisories: DSA-4844-1 dnsmasq -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6bdd82a7af8c0333eca753b3b7b02111

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.4.33 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210281 - Security Advisory

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.1

title:dnspooqurl:https://github.com/knqyf263/dnspooq

Trust: 0.1

title:multironic Requirements: Install libvirt and prepare nodes have to check why we need this TODO download ironic images later Pull images Tag images Push images run httpd Check that two vbmcs are running for the two nodes Play with vbmc and ipmitools Run management cluster Firewall Launch ironic run capm3 Firewall Refurl:https://github.com/mboukhalfa/multironic

Trust: 0.1

title:Criminal IP NSE Scripturl:https://github.com/criminalip/CIP-NSE-Script

Trust: 0.1

title:Intro: What's pique or repique Overviewurl:https://github.com/AZ-X/pique

Trust: 0.1

title:https://github.com/klcheung99/CSCM28CW2url:https://github.com/klcheung99/CSCM28CW2

Trust: 0.1

title:Kaosagnt's Ansible Everyday Utilsurl:https://github.com/kaosagnt/ansible-everyday

Trust: 0.1

title:F5の脆弱性情報url:https://github.com/DNTYO/F5_Vulnerability

Trust: 0.1

title:Vulnerabilityurl:https://github.com/tzwlhack/Vulnerability

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/JERRY123S/all-poc

Trust: 0.1

title:SecBooks SecBooks目录url:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/top

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/awesome-cve-repo

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/hktalent/TOP

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/cyberanand1337x/bug-bounty-2022

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/weeka10/-hktalent-TOP

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/01/20/dns_cache_poisoning/

Trust: 0.1

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684

EXTERNAL IDS

db:NVDid:CVE-2020-25684

Trust: 3.3

db:CERT/CCid:VU#434904

Trust: 0.8

db:AUSCERTid:ESB-2021.0231

Trust: 0.6

db:CNVDid:CNVD-2021-16431

Trust: 0.6

db:VULMONid:CVE-2020-25684

Trust: 0.1

db:PACKETSTORMid:161535

Trust: 0.1

db:PACKETSTORMid:161281

Trust: 0.1

db:PACKETSTORMid:161100

Trust: 0.1

db:PACKETSTORMid:161017

Trust: 0.1

db:PACKETSTORMid:161013

Trust: 0.1

db:PACKETSTORMid:161085

Trust: 0.1

db:PACKETSTORMid:161014

Trust: 0.1

db:PACKETSTORMid:169002

Trust: 0.1

sources: CERT/CC: VU#434904 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 161535 // PACKETSTORM: 161281 // PACKETSTORM: 161100 // PACKETSTORM: 161017 // PACKETSTORM: 161013 // PACKETSTORM: 161085 // PACKETSTORM: 161014 // PACKETSTORM: 169002 // NVD: CVE-2020-25684

REFERENCES

url:https://security.gentoo.org/glsa/202101-17

Trust: 1.2

url:https://bugzilla.redhat.com/show_bug.cgi?id=1889686

Trust: 1.1

url:https://www.jsof-tech.com/disclosures/dnspooq/

Trust: 1.1

url:https://www.debian.org/security/2021/dsa-4844

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html

Trust: 1.1

url:https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 1.1

url:cve-2020-25681

Trust: 0.8

url:cve-2020-25682

Trust: 0.8

url:cve-2020-25683

Trust: 0.8

url:cve-2020-25684

Trust: 0.8

url:cve-2020-25685

Trust: 0.8

url:cve-2020-25686

Trust: 0.8

url:cve-2020-25687

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25686

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25684

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25685

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.0231/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-25685

Trust: 0.5

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-001

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-25686

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-25684

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25682

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25687

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25683

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25681

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-25682

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-25687

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-25681

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-25683

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0156

Trust: 0.1

url:https://github.com/knqyf263/dnspooq

Trust: 0.1

url:https://security.archlinux.org/cve-2020-25684

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14834

Trust: 0.1

url:https://usn.ubuntu.com/4698-1

Trust: 0.1

url:https://usn.ubuntu.com/4698-2

Trust: 0.1

url:https://launchpad.net/bugs/1916462

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.2

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0401

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3156

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0240

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0153

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0152

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0151

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/dnsmasq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

sources: CERT/CC: VU#434904 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 161535 // PACKETSTORM: 161281 // PACKETSTORM: 161100 // PACKETSTORM: 161017 // PACKETSTORM: 161013 // PACKETSTORM: 161085 // PACKETSTORM: 161014 // PACKETSTORM: 169002 // NVD: CVE-2020-25684

CREDITS

This document was written by Vijay Sarvepalli.Statement Date:   January 04, 2021

Trust: 0.8

sources: CERT/CC: VU#434904

SOURCES

db:CERT/CCid:VU#434904
db:CNVDid:CNVD-2021-16431
db:VULMONid:CVE-2020-25684
db:PACKETSTORMid:161535
db:PACKETSTORMid:161281
db:PACKETSTORMid:161100
db:PACKETSTORMid:161017
db:PACKETSTORMid:161013
db:PACKETSTORMid:161085
db:PACKETSTORMid:161014
db:PACKETSTORMid:169002
db:NVDid:CVE-2020-25684

LAST UPDATE DATE

2024-09-17T21:25:07.430000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#434904date:2021-10-06T00:00:00
db:CNVDid:CNVD-2021-16431date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25684date:2023-11-07T00:00:00
db:NVDid:CVE-2020-25684date:2023-11-07T03:20:22.107

SOURCES RELEASE DATE

db:CERT/CCid:VU#434904date:2021-01-19T00:00:00
db:CNVDid:CNVD-2021-16431date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25684date:2021-01-20T00:00:00
db:PACKETSTORMid:161535date:2021-02-25T15:26:41
db:PACKETSTORMid:161281date:2021-02-03T16:36:53
db:PACKETSTORMid:161100date:2021-01-25T17:28:49
db:PACKETSTORMid:161017date:2021-01-19T14:45:56
db:PACKETSTORMid:161013date:2021-01-19T14:45:21
db:PACKETSTORMid:161085date:2021-01-25T14:38:26
db:PACKETSTORMid:161014date:2021-01-19T14:45:29
db:PACKETSTORMid:169002date:2021-02-28T20:12:00
db:NVDid:CVE-2020-25684date:2021-01-20T16:15:14.163