CVE-2021-3448
Publication date 8 April 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Status
Package | Ubuntu Release | Status |
---|---|---|
dnsmasq | 24.10 oracular |
Fixed 2.85-1ubuntu1
|
24.04 LTS noble |
Fixed 2.85-1ubuntu1
|
|
22.04 LTS jammy |
Fixed 2.85-1ubuntu1
|
|
20.04 LTS focal |
Fixed 2.80-1.1ubuntu1.4
|
|
18.04 LTS bionic |
Fixed 2.79-1ubuntu0.4
|
|
16.04 LTS xenial |
Fixed 2.79-1ubuntu0.16.04.1+esm1
|
|
14.04 LTS trusty | Ignored end of ESM support, was needed |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
mdeslaur
This issue only affects dnsmasq in non-default configurations where the server=<address>@<interface> option is used. In those environments, this issue can be prevented by disabling cache by also using a cache-size=0 configuration option. For the dnsmasq instance used by Network-Manager, it is not vulnerable to this issue as Ubuntu disables caching by default. (See Update-dnsmasq-parameters.patch in the network-manager package)
Patch details
Package | Patch details |
---|---|
dnsmasq |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.0 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-4976-1
- Dnsmasq vulnerability
- 2 June 2021
- USN-4976-2
- Dnsmasq vulnerability
- 7 September 2022