Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

DNS:REQUEST:DNS-INT-UNDERFLOW

Severity

Minor

Recommended

Yes

Recommended Action

Drop

Category

DNS

Keywords

DNSmasq answer_auth and answer_request Integer Underflow

Release Date

2017/10/24

Update Number

3000

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

DNS: DNSmasq answer_auth and answer_request Integer Underflow


An integer underflow vulnerability has been reported in dnsmasq. A remote, unauthenticated attacker can exploit this vulnerability by sending a large UDP packet to the target system. Successful exploitation results in termination of the dnsmasq process.

Extended Description

In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platforms), making dnsmasq crash.

Affected Products

  • Canonical ubuntu_linux 14.04
  • Canonical ubuntu_linux 16.04
  • Canonical ubuntu_linux 17.04
  • Debian debian_linux 7.0
  • Debian debian_linux 7.1
  • Debian debian_linux 9.0
  • Fedoraproject fedora 27
  • Novell leap 42.2
  • Novell leap 42.3
  • Redhat enterprise_linux_desktop 7.0
  • Redhat enterprise_linux_server 7.0
  • Redhat enterprise_linux_workstation 7.0
  • Thekelleys dnsmasq 2.77

References

  • BugTraq: 101085
  • CVE: CVE-2017-13704

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out