Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2021-3448

Published: August 31, 2023Last modified: August 31, 2023

Description

A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.

Severity score breakdown

ParameterValue
Base score4
Attack VectorNETWORK
Attack complexityHIGH
Privileges requiredNONE
User interactionNONE
ScopeCHANGED
ConfidentialityNONE
Integrity impactLOW
Availability impactNONE
VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSdnsmasqNot affected (2.87-r2)
StreamdnsmasqNot affected (2.89-r6)

References

ON THIS PAGE