Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Pi-hole Ad-Blocker FTL < 5.5 Multiple Vulnerabilities in Dnsmasq (DNSpooq)

Information

Severity

Severity

High

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

Dnsmasq as used in the 'FTL' component of the Pi-hole Ad-Blocker is prone to multiple vulnerabilities dubbed 'DNSpooq'.

Insight

Insight

The following flaws exist in Dnsmasq versions prior to 2.83 as used in the 'FTL' component: - A heap-based buffer overflow in sort_rrset() when DNSSEC is used. (CVE-2020-25681) - A buffer overflow in extract_name() function due to missing length check, when DNSSEC is enabled. (CVE-2020-25682) - A heap-based buffer overflow when DNSSEC is enabled. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata(). (CVE-2020-25683) - A lack of proper address/port check implemented in the reply_query function. (CVE-2020-25684) - A lack of query resource name (RRNAME) checks implemented in the reply_query function. (CVE-2020-25685) - Multiple DNS query requests for the same resource name (RRNAME) allows for remote attackers to spoof DNS traffic, using a birthday attack (RFC 5452). (CVE-2020-25686) - A heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset(). (CVE-2020-25687)

Affected Software

Affected Software

Pi-hole Ad-Blocker FTL versions prior to 5.5.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to FTL version 5.5 or later.