Dnsmasq software version 2.78 download gemtek
When receiving a query, dnsmasq does not check for an existing pending request for the same name and forwards a new request. By default, a maximum of pending queries can be sent to upstream servers, so there can be at most queries for the same name.
This flaw allows an off-path attacker on the network to substantially reduce the number of attempts that it would have to perform to forge a reply and have it accepted by dnsmasq. If chained with CVE, the attack complexity of a successful attack is reduced.
When getting a reply from a forwarded query, dnsmasq checks in forward. Due to the weak hash CRC32 when dnsmasq is compiled without DNSSEC, SHA-1 when it is this flaw allows an off-path attacker to find several different domains all having the same hash, substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq.
This is in contrast with RFC, which specifies that the query name is one of the attributes of a query that must be used to match a reply. If chained with CVE the attack complexity of a successful attack is reduced. When getting a reply from a forwarded query, dnsmasq checks in the forward. This issue contrasts with RFC, which specifies a query's attributes that all must be used to match a reply.
Sort by: Status Alphabetical. Expand all. Javascript is disabled. Click here to view vendors. Vendor Information We are not aware of further vendor information regarding this vulnerability. Vendor References. Arista Networks, Inc. AsusTek Computer Inc. Avaya, Inc. To solve the vulnerability on your device, apply the firmware or system update that contains DnsMasq software version 2.
If an update addressing the vulnerability is not yet available for your device, you can secure your router or Wi-Fi hotspot with a strong password to minimize risks imposed by the vulnerability.
We also advise you not to visit suspicious websites or run software from questionable sources. I recommend you phone contact NG support in regards to this to see if there is any help or information regarding it. Report Vulnerabilities. We are continuing to monitor the situation to ensure that the best possible service is provided to our customers. Click here for our top support FAQs. Router firmware correcting this issue will be available ASAP. Showing results for.
Show only Search instead for. Did you mean:. All forum topics Previous Topic Next Topic. DCglasgow Contributor. Message 1 of Avast reports smarthub vulnerable to attack. Description Solution Details. Description Our scan found a vulnerability on your router or Wi-Fi hotspot device. Android devices used as a Wi-Fi hotspot can be also affected.
Solution Some of the vulnerabilities may be patched in new versions of the device firmware or system update. Message 2 of Re: Avast reports smarthub vulnerable to attack. I have had the same report from Avast. Any answer to this? Message 3 of
0コメント