ID

VAR-202101-0220


CVE

CVE-2020-25684


TITLE

Dnsmasq is vulnerable to memory corruption and cache poisoning

Trust: 0.8

sources: CERT/CC: VU#434904

DESCRIPTION

A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. Dnsmasq is vulnerable to a set of memory corruption issues handling DNSSEC data and a second set of issues validating DNS responses. These vulnerabilities could allow an attacker to corrupt memory on a vulnerable system and perform cache poisoning attacks against a vulnerable environment.CVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not AffectedCVE-2020-25681 Not Affected CVE-2020-25682 Not Affected CVE-2020-25683 Not Affected CVE-2020-25684 Affected CVE-2020-25685 Affected CVE-2020-25686 Affected CVE-2020-25687 Not Affected. dnsmasq There is a security check vulnerability in.Information may be tampered with. Dnsmasq is a lightweight DNS forwarding and DHCP and TFTP server written in C language. ========================================================================== Ubuntu Security Notice USN-4698-2 February 24, 2021 dnsmasq regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: USN-4698-1 introduced regressions in Dnsmasq. Software Description: - dnsmasq: Small caching DNS proxy and DHCP/TFTP server Details: USN-4698-1 fixed vulnerabilities in Dnsmasq. The updates introduced regressions in certain environments related to issues with multiple queries, and issues with retries. This update fixes the problem. Original advisory details: Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled memory when sorting RRsets. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25681, CVE-2020-25687) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled extracting certain names. A remote attacker could use this issue to cause Dnsmasq to hang, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2020-25682, CVE-2020-25683) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented address/port checks. (CVE-2020-25684) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly implemented query resource name checks. (CVE-2020-25685) Moshe Kol and Shlomi Oberman discovered that Dnsmasq incorrectly handled multiple query requests for the same resource name. (CVE-2020-25686) It was discovered that Dnsmasq incorrectly handled memory during DHCP response creation. A remote attacker could possibly use this issue to cause Dnsmasq to consume resources, leading to a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2019-14834) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: dnsmasq 2.82-1ubuntu1.2 dnsmasq-base 2.82-1ubuntu1.2 dnsmasq-utils 2.82-1ubuntu1.2 Ubuntu 20.04 LTS: dnsmasq 2.80-1.1ubuntu1.3 dnsmasq-base 2.80-1.1ubuntu1.3 dnsmasq-utils 2.80-1.1ubuntu1.3 Ubuntu 18.04 LTS: dnsmasq 2.79-1ubuntu0.3 dnsmasq-base 2.79-1ubuntu0.3 dnsmasq-utils 2.79-1ubuntu0.3 Ubuntu 16.04 LTS: dnsmasq 2.75-1ubuntu0.16.04.8 dnsmasq-base 2.75-1ubuntu0.16.04.8 dnsmasq-utils 2.75-1ubuntu0.16.04.8 After a standard system update you need to reboot your computer to make all the necessary changes. 7.2) - x86_64 3. 8) - aarch64, ppc64le, s390x, x86_64 3. Relevant releases/architectures: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1889686 - CVE-2020-25684 dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker 1889688 - CVE-2020-25685 dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker 1890125 - CVE-2020-25686 dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker 6. Package List: Red Hat Enterprise Linux ComputeNode EUS (v. 7.6): Source: dnsmasq-2.76-7.el7_6.2.src.rpm x86_64: dnsmasq-2.76-7.el7_6.2.x86_64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6): x86_64: dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm dnsmasq-utils-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 7.6): Source: dnsmasq-2.76-7.el7_6.2.src.rpm ppc64: dnsmasq-2.76-7.el7_6.2.ppc64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64.rpm ppc64le: dnsmasq-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-2.76-7.el7_6.2.s390x.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm x86_64: dnsmasq-2.76-7.el7_6.2.x86_64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: dnsmasq-2.76-7.el7_6.2.src.rpm aarch64: dnsmasq-2.76-7.el7_6.2.aarch64.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.aarch64.rpm ppc64le: dnsmasq-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-2.76-7.el7_6.2.s390x.rpm dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm Red Hat Enterprise Linux Server Optional EUS (v. 7.6): ppc64: dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64.rpm dnsmasq-utils-2.76-7.el7_6.2.ppc64.rpm ppc64le: dnsmasq-debuginfo-2.76-7.el7_6.2.ppc64le.rpm dnsmasq-utils-2.76-7.el7_6.2.ppc64le.rpm s390x: dnsmasq-debuginfo-2.76-7.el7_6.2.s390x.rpm dnsmasq-utils-2.76-7.el7_6.2.s390x.rpm x86_64: dnsmasq-debuginfo-2.76-7.el7_6.2.x86_64.rpm dnsmasq-utils-2.76-7.el7_6.2.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.4.33 bug fix and security update Advisory ID: RHSA-2021:0281-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:0281 Issue date: 2021-02-03 CVE Names: CVE-2020-2304 CVE-2020-2305 CVE-2020-8559 CVE-2020-8564 CVE-2020-14382 CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 CVE-2020-25687 CVE-2020-25694 CVE-2020-25696 CVE-2021-20182 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.4.33 is now available with updates to packages and images that fix several bugs and add enhancements. This release also includes a security update for Red Hat OpenShift Container Platform 4.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es): * openshift: builder allows read and write of block devices (CVE-2021-20182) * kubernetes: Compromised node could escalate to cluster level privileges (CVE-2020-8559) * kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 (CVE-2020-8564) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This advisory contains the container images for Red Hat OpenShift Container Platform 4.4.33. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2021:0282 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel ease-notes.html This update fixes the following bugs among others: * Previously, there were broken connections to the API server that caused nodes to remain in the NotReady state. Detecting a broken network connection could take up to 15 minutes, during which the platform would remain unavailable. This is now fixed by setting the TCP_USER_TIMEOUT socket option, which controls how long transmitted data can be unacknowledged before the connection is forcefully closed. (BZ#1907939) * Previously, the quota controllers only worked on resources retrieved from the discovery endpoint, which might contain only a fraction of all resources due to a network error. This is now fixed by having the quota controllers periodically resync when new resources are observed from the discovery endpoint. (BZ#1910096) * Previously, the kuryr-controller was comparing security groups related to network policies incorrectly. This caused security rules related to a network policy to be recreated on every minor update of that network policy. This bug has been fixed, allowing network policy updates that already have existing rules to be preserved; network policy additions or deletions are performed, if needed. (BZ#1910221) You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.4.33-x86_64 The image digest is sha256:a035dddd8a5e5c99484138951ef4aba021799b77eb9046f683a5466c23717738 (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.4.33-s390x The image digest is sha256:ecc1e5aaf8496dd60a7703562fd6c65541172a56ae9008fce6db5d55e43371dc (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.4.33-ppc64le The image digest is sha256:567bf8031c80b08e3e56a57e1c8e5b0b01a2f922e01b36ee333f6ab5bff95495 All OpenShift Container Platform 4.4 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.4/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. 3. Solution: For OpenShift Container Platform 4.4 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.4/updating/updating-cluster - -cli.html. 4. Bugs fixed (https://bugzilla.redhat.com/): 1848516 - [4.4] Unresponsive OpenShift 4.4 cluster on Azure (UPI) 1851422 - CVE-2020-8559 kubernetes: compromised node could escalate to cluster level privileges 1886637 - CVE-2020-8564 kubernetes: Docker config secrets leaked when file is malformed and loglevel >= 4 1895332 - NP CRD unable to be patched because of missing sg rule ID 1897546 - Backup taken on one master cannot be restored on other masters 1900727 - Using shareProcessNamespace with default pod image leaves unreaped processes 1904413 - (release 4.4) Hostsubnet gatherer produces wrong output 1905891 - genericapiserver library must wait for server.Shutdown 1906484 - Etcd container leaves grep and lsof zombie processes 1907939 - Nodes goes into NotReady state (VMware) 1910096 - [release-4.4] The quota controllers should resync on new resources and make progress 1910221 - kuryr tempest plugin test test_ipblock_network_policy_sg_rules fails 1915110 - CVE-2021-20182 openshift: builder allows read and write of block devices 1916952 - OperatorExited, Pending marketplace-operator-... pod for several weeks 1917416 - e2e: should be able to pull image from docker hub is failing permanently 1918609 - ARO/Azure: excessive pod memory allocation causes node lockup 1918974 - [sig-devex][Feature:ImageEcosystem][Slow] openshift images should be SCL enabled returning s2i usage when running the image 5. References: https://access.redhat.com/security/cve/CVE-2020-2304 https://access.redhat.com/security/cve/CVE-2020-2305 https://access.redhat.com/security/cve/CVE-2020-8559 https://access.redhat.com/security/cve/CVE-2020-8564 https://access.redhat.com/security/cve/CVE-2020-14382 https://access.redhat.com/security/cve/CVE-2020-25681 https://access.redhat.com/security/cve/CVE-2020-25682 https://access.redhat.com/security/cve/CVE-2020-25683 https://access.redhat.com/security/cve/CVE-2020-25684 https://access.redhat.com/security/cve/CVE-2020-25685 https://access.redhat.com/security/cve/CVE-2020-25686 https://access.redhat.com/security/cve/CVE-2020-25687 https://access.redhat.com/security/cve/CVE-2020-25694 https://access.redhat.com/security/cve/CVE-2020-25696 https://access.redhat.com/security/cve/CVE-2021-20182 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYBp6w9zjgjWX9erEAQg0JhAAhv2R8jAKUz7A/RTezDOJQiDcQ1do+jV2 PD59ab0pCrWCA70gAh7mdZnaniKQGeBL1qh/lOYV0GPOpsGZjTG9ylVOg2TOEnjD /WMOnHMehWoyZR6Ys0SNQFkdf0bkvLE33r5qEcd+l/cElaqxSH4b1gG2jU9FUOK8 fAG9tmWvfbSXgGcpND5guS/jVuL8dQOyC1ktQnXdfkMvZLDOlwBotGbxTi/adzUS 6YzikRCBzoZMZC13+ZtiznfIQeq8lKlZ3+0O2lXi5KTiSqby7HmIrawUwtiHUnzJ 9VUs8zIcA/ynr3h5POhvpg0XgioUsjJ+2U0r8EP+rYtJ4lcrT68vhAzkCysMg/y4 znQ+y5M4uoxXycB92kFrMA1og8jfJCuh5y50duo9OhOe2D75Em0XnhwGoEJrDe3z jefvSwBb9WNG+jagrX69aaBrq36qhfutaI0SU7FNhoHL4Ev50zByBXSFJzQR3b59 fh0YdzC1VTCE/LKBhELpuW7VOk4MDEs5AQAiIXv3QxKKmnyLJwnQUMwSdZiQef2X z5p8crPmGEwdZ10cDgmFH7mOb2F2utFy1FzuDh+h5lXhAmCfgggiHp5fADd43h47 EAtIwmu3VurOIkvMaqQTwL5SjVAajd26KVAa09Pb6TdWAhN/jFFRvjKJMm7523Mo mafFnOJZH7k= =9sMW -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For the stable distribution (buster), these problems have been fixed in version 2.80-1+deb10u1. We recommend that you upgrade your dnsmasq packages. For the detailed security status of dnsmasq please refer to its security tracker page at: https://security-tracker.debian.org/tracker/dnsmasq Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAZVA4ACgkQEL6Jg/PV nWQYKAgAgVwonRAgXSliaFh0n44OPOz9wf4KibG7otcnAx4V4XqFAeXsHd/hIX/K IC313F3I+8WzvjKBhvt2KnGG9SnoTnq4roBIa1nz//vNX0hyfDm5xPlxQOExzC+c YS8kGt++SvC2wgOsrZEjyk0ecKqDJmZSwW31zXG9/2kTzCbKjuDp+i4TTADqabPC AgbmEGVKBR2Fk7K9Prct27oWoj7LHMaH+Ttb8uQGnG7OgJs9KyRI+2qIu+VaRCGf yfRj+XayPYHV1Amf5dLIKcLMMp/FnkNFoO2YIAZkWVPjXD2uPKUykJJ1GRl8R+0q qtNhPTNNuD6WnYzC8yP0KIQ2tsbg9Q== =j5Ka -----END PGP SIGNATURE-----

Trust: 3.6

sources: NVD: CVE-2020-25684 // CERT/CC: VU#434904 // JVNDB: JVNDB-2020-015547 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // PACKETSTORM: 161535 // PACKETSTORM: 161100 // PACKETSTORM: 161012 // PACKETSTORM: 161020 // PACKETSTORM: 161269 // PACKETSTORM: 161013 // PACKETSTORM: 169002

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-16431

AFFECTED PRODUCTS

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.24

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.21.14m

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.25

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.21

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.22

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.23.7m

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.24.5m

Trust: 1.0

vendor:aristamodel:eosscope:gteversion:4.23

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.25.2f

Trust: 1.0

vendor:aristamodel:eosscope:ltversion:4.22.9m

Trust: 1.0

vendor:thekelleysmodel:dnsmasqscope:ltversion:2.83

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:thekelleysmodel:dnsmasqscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.83

Trust: 0.6

sources: CNVD: CNVD-2021-16431 // JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-25684
value: LOW

Trust: 1.0

NVD: CVE-2020-25684
value: LOW

Trust: 0.8

CNVD: CNVD-2021-16431
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202101-1611
value: LOW

Trust: 0.6

VULMON: CVE-2020-25684
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-25684
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-16431
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-25684
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2020-25684
baseSeverity: LOW
baseScore: 3.7
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // JVNDB: JVNDB-2020-015547 // CNNVD: CNNVD-202101-1611 // NVD: CVE-2020-25684

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-358

Trust: 1.0

problemtype:Improperly implemented security checks (CWE-358) [ Other ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015547 // NVD: CVE-2020-25684

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 161535 // CNNVD: CNNVD-202101-1611

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202101-1611

PATCH

title:Top Pageurl:https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html

Trust: 0.8

title:Patch for Dnsmasq security feature issue vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/251931

Trust: 0.6

title:Dnsmasq Fixing measures for security feature vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139960

Trust: 0.6

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210156 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210240 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210245 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210153 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210154 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210155 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat Virtualization Host security bug fix and enhancement update [ovirt-4.4.4]url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210401 - Security Advisory

Trust: 0.1

title:Red Hat: Important: RHV-H security, bug fix, enhancement update (redhat-virtualization-host) 4.3.13url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210395 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210151 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210150 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dnsmasq security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210152 - Security Advisory

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-25684 log

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1587url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1587

Trust: 0.1

title:Debian Security Advisories: DSA-4844-1 dnsmasq -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=6bdd82a7af8c0333eca753b3b7b02111

Trust: 0.1

title:Red Hat: Important: OpenShift Container Platform 4.4.33 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210281 - Security Advisory

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.1

title:dnspooqurl:https://github.com/knqyf263/dnspooq

Trust: 0.1

title:multironic Requirements: Install libvirt and prepare nodes have to check why we need this TODO download ironic images later Pull images Tag images Push images run httpd Check that two vbmcs are running for the two nodes Play with vbmc and ipmitools Run management cluster Firewall Launch ironic run capm3 Firewall Refurl:https://github.com/mboukhalfa/multironic

Trust: 0.1

title:Criminal IP NSE Scripturl:https://github.com/criminalip/CIP-NSE-Script

Trust: 0.1

title:Intro: What's pique or repique Overviewurl:https://github.com/AZ-X/pique

Trust: 0.1

title:https://github.com/klcheung99/CSCM28CW2url:https://github.com/klcheung99/CSCM28CW2

Trust: 0.1

title:Kaosagnt's Ansible Everyday Utilsurl:https://github.com/kaosagnt/ansible-everyday

Trust: 0.1

title:F5の脆弱性情報url:https://github.com/DNTYO/F5_Vulnerability

Trust: 0.1

title:Vulnerabilityurl:https://github.com/tzwlhack/Vulnerability

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/JERRY123S/all-poc

Trust: 0.1

title:SecBooks SecBooks目录url:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/top

Trust: 0.1

title:Table of Contentsurl:https://github.com/CVEDB/awesome-cve-repo

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/hktalent/TOP

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/cyberanand1337x/bug-bounty-2022

Trust: 0.1

title:TOP Table of Contents Donationurl:https://github.com/weeka10/-hktalent-TOP

Trust: 0.1

title:PoC in GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2021/01/20/dns_cache_poisoning/

Trust: 0.1

sources: CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // JVNDB: JVNDB-2020-015547 // CNNVD: CNNVD-202101-1611

EXTERNAL IDS

db:NVDid:CVE-2020-25684

Trust: 4.6

db:AUSCERTid:ESB-2021.0231

Trust: 1.2

db:CERT/CCid:VU#434904

Trust: 0.8

db:JVNid:JVNVU90340376

Trust: 0.8

db:JVNDBid:JVNDB-2020-015547

Trust: 0.8

db:PACKETSTORMid:161535

Trust: 0.7

db:CNVDid:CNVD-2021-16431

Trust: 0.6

db:PACKETSTORMid:161281

Trust: 0.6

db:PACKETSTORMid:161085

Trust: 0.6

db:AUSCERTid:ESB-2021.0987

Trust: 0.6

db:AUSCERTid:ESB-2021.0420

Trust: 0.6

db:AUSCERTid:ESB-2021.0692

Trust: 0.6

db:AUSCERTid:ESB-2021.0864

Trust: 0.6

db:AUSCERTid:ESB-2021.0283

Trust: 0.6

db:AUSCERTid:ESB-2021.1088

Trust: 0.6

db:AUSCERTid:ESB-2021.0699

Trust: 0.6

db:CS-HELPid:SB2021122911

Trust: 0.6

db:CS-HELPid:SB2021070106

Trust: 0.6

db:ICS CERTid:ICSA-21-019-01

Trust: 0.6

db:CNNVDid:CNNVD-202101-1611

Trust: 0.6

db:VULMONid:CVE-2020-25684

Trust: 0.1

db:PACKETSTORMid:161100

Trust: 0.1

db:PACKETSTORMid:161012

Trust: 0.1

db:PACKETSTORMid:161020

Trust: 0.1

db:PACKETSTORMid:161269

Trust: 0.1

db:PACKETSTORMid:161013

Trust: 0.1

db:PACKETSTORMid:169002

Trust: 0.1

sources: CERT/CC: VU#434904 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // JVNDB: JVNDB-2020-015547 // PACKETSTORM: 161535 // PACKETSTORM: 161100 // PACKETSTORM: 161012 // PACKETSTORM: 161020 // PACKETSTORM: 161269 // PACKETSTORM: 161013 // PACKETSTORM: 169002 // CNNVD: CNNVD-202101-1611 // NVD: CVE-2020-25684

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1889686

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-25684

Trust: 2.1

url:https://www.jsof-tech.com/disclosures/dnspooq/

Trust: 1.7

url:https://security.gentoo.org/glsa/202101-17

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-4844

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61

Trust: 1.7

url:https://www.auscert.org.au/bulletins/esb-2021.0231/

Trust: 1.2

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 1.1

url:cve-2020-25681

Trust: 0.8

url:cve-2020-25682

Trust: 0.8

url:cve-2020-25683

Trust: 0.8

url:cve-2020-25684

Trust: 0.8

url:cve-2020-25685

Trust: 0.8

url:cve-2020-25686

Trust: 0.8

url:cve-2020-25687

Trust: 0.8

url:https://jvn.jp/vu/jvnvu90340376/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-25686

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-25685

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/qgb7hl3owhtlepsmldgomxqkg3km2qme/

Trust: 0.6

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/wyw3ir6apuskoykl5ft3actihwhgqy32/

Trust: 0.6

url:https://packetstormsecurity.com/files/161281/red-hat-security-advisory-2021-0401-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161535/ubuntu-security-notice-usn-4698-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161085/gentoo-linux-security-advisory-202101-17.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0699

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0864

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210120-01-dnspooq-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0987

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0283/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-019-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0692

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1088

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0420

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021070106

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-privileged-identity-manager-is-affected-by-security-vulnerabilities-cve-2020-25684-cve-2020-25685-cve-2020-25686/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122911

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-25685

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-25686

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2020-25684

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-001

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25682

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25687

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25683

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-25681

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25682

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25687

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25681

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-25683

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0156

Trust: 0.1

url:https://github.com/knqyf263/dnspooq

Trust: 0.1

url:https://security.archlinux.org/cve-2020-25684

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.80-1.1ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.79-1ubuntu0.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.75-1ubuntu0.16.04.8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14834

Trust: 0.1

url:https://usn.ubuntu.com/4698-1

Trust: 0.1

url:https://usn.ubuntu.com/4698-2

Trust: 0.1

url:https://launchpad.net/bugs/1916462

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/dnsmasq/2.82-1ubuntu1.2

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0240

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0150

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25696

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20182

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25696

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25694

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0281

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25694

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2304

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20182

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14382

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-2305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8559

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14382

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.4/release_notes/ocp-4-4-rel

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-2305

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-2304

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-8564

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.4/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-8564

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0282

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0152

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://security-tracker.debian.org/tracker/dnsmasq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

sources: CERT/CC: VU#434904 // CNVD: CNVD-2021-16431 // VULMON: CVE-2020-25684 // JVNDB: JVNDB-2020-015547 // PACKETSTORM: 161535 // PACKETSTORM: 161100 // PACKETSTORM: 161012 // PACKETSTORM: 161020 // PACKETSTORM: 161269 // PACKETSTORM: 161013 // PACKETSTORM: 169002 // CNNVD: CNNVD-202101-1611 // NVD: CVE-2020-25684

CREDITS

This document was written by Vijay Sarvepalli.Statement Date:   January 04, 2021

Trust: 0.8

sources: CERT/CC: VU#434904

SOURCES

db:CERT/CCid:VU#434904
db:CNVDid:CNVD-2021-16431
db:VULMONid:CVE-2020-25684
db:JVNDBid:JVNDB-2020-015547
db:PACKETSTORMid:161535
db:PACKETSTORMid:161100
db:PACKETSTORMid:161012
db:PACKETSTORMid:161020
db:PACKETSTORMid:161269
db:PACKETSTORMid:161013
db:PACKETSTORMid:169002
db:CNNVDid:CNNVD-202101-1611
db:NVDid:CVE-2020-25684

LAST UPDATE DATE

2024-11-20T21:17:00.379000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#434904date:2021-10-06T00:00:00
db:CNVDid:CNVD-2021-16431date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25684date:2023-11-07T00:00:00
db:JVNDBid:JVNDB-2020-015547date:2021-10-04T08:30:00
db:CNNVDid:CNNVD-202101-1611date:2022-03-10T00:00:00
db:NVDid:CVE-2020-25684date:2023-11-07T03:20:22.107

SOURCES RELEASE DATE

db:CERT/CCid:VU#434904date:2021-01-19T00:00:00
db:CNVDid:CNVD-2021-16431date:2021-03-11T00:00:00
db:VULMONid:CVE-2020-25684date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2020-015547date:2021-10-04T00:00:00
db:PACKETSTORMid:161535date:2021-02-25T15:26:41
db:PACKETSTORMid:161100date:2021-01-25T17:28:49
db:PACKETSTORMid:161012date:2021-01-19T14:45:12
db:PACKETSTORMid:161020date:2021-01-19T14:46:21
db:PACKETSTORMid:161269date:2021-02-03T16:14:39
db:PACKETSTORMid:161013date:2021-01-19T14:45:21
db:PACKETSTORMid:169002date:2021-02-28T20:12:00
db:CNNVDid:CNNVD-202101-1611date:2021-01-20T00:00:00
db:NVDid:CVE-2020-25684date:2021-01-20T16:15:14.163