CVE-2019-14513

HIGH

Dnsmasq <2.76 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.

References (2)

Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Slovejoy/dnsmasq-pre2.76
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/09/msg00013.html

Scores

CVSS v3 7.5
EPSS 0.0005
EPSS Percentile 14.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (2)
debian/debian_linux 8.0
thekelleys/dnsmasq < 2.76
Published Aug 01, 2019
Tracked Since Feb 18, 2026