Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Pi-hole Ad-Blocker FTL < 5.5 Multiple Vulnerabilities in Dnsmasq (DNSpooq)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Dnsmasq as used in the 'FTL' component of the Pi-hole Ad-Blocker is prone to multiple vulnerabilities dubbed 'DNSpooq'.
Insight
Insight
The following flaws exist in Dnsmasq versions prior to 2.83 as used in the 'FTL' component: - A heap-based buffer overflow in sort_rrset() when DNSSEC is used. (CVE-2020-25681) - A buffer overflow in extract_name() function due to missing length check, when DNSSEC is enabled. (CVE-2020-25682) - A heap-based buffer overflow when DNSSEC is enabled. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in get_rdata(). (CVE-2020-25683) - A lack of proper address/port check implemented in the reply_query function. (CVE-2020-25684) - A lack of query resource name (RRNAME) checks implemented in the reply_query function. (CVE-2020-25685) - Multiple DNS query requests for the same resource name (RRNAME) allows for remote attackers to spoof DNS traffic, using a birthday attack (RFC 5452). (CVE-2020-25686) - A heap-based buffer overflow with large memcpy in sort_rrset() when DNSSEC is enabled. This flaw is caused by the lack of length checks in rfc1035.c:extract_name(), which could be abused to make the code execute memcpy() with a negative size in sort_rrset(). (CVE-2020-25687)
Affected Software
Affected Software
Pi-hole Ad-Blocker FTL versions prior to 5.5.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to FTL version 5.5 or later.