accept no compromises

Ubuntu Security Notice USN-3430-2

Ubuntu Security Notice USN-3430-2
Posted Oct 3, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3430-2 - USN-3430-1 fixed several vulnerabilities in Dnsmasq. This update provides the corresponding update for Ubuntu 12.04 ESM. A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher A discovered that Dnsmasq incorrectly handled DNS requests. A remote A attacker could use this issue to cause Dnsmasq to crash, resulting in A a denial of service, or possibly execute arbitrary code.A A Various other issues were also addressed.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494, CVE-2017-14495, CVE-2017-14496
MD5 | 31ae3a8fa54f7d5ca3b4a9dbab5dc681

Ubuntu Security Notice USN-3430-2

Change Mirror Download
==========================================================================
Ubuntu Security Notice USN-3430-2
October 03, 2017

dnsmasq vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Dnsmasq.

Software Description:
- dnsmasq: Small caching DNS proxy and DHCP/TFTP server

Details:

USN-3430-1 fixed several vulnerabilities in Dnsmasq. This update
provides the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DNS requests. A remote
A attacker could use this issue to cause Dnsmasq to crash, resulting in
A a denial of service, or possibly execute arbitrary code.A
A (CVE-2017-14491)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled IPv6 router
A advertisements. A remote attacker could use this issue to cause
A Dnsmasq to crash, resulting in a denial of service, or possibly
A execute arbitrary code. (CVE-2017-14492)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DHCPv6 requests. A remote
A attacker could use this issue to cause Dnsmasq to crash, resulting in
A a denial of service, or possibly execute arbitrary code.A
A (CVE-2017-14493)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DHCPv6 packets. A remote
A attacker could use this issue to possibly obtain sensitive memory
A contents. (CVE-2017-14494)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DNS requests. A remote
A attacker could use this issue to cause Dnsmasq to consume memory,
A resulting in a denial of service. (CVE-2017-14495)

A Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
A discovered that Dnsmasq incorrectly handled DNS requests. A remote
A attacker could use this issue to cause Dnsmasq to crash, resulting in
A a denial of service. (CVE-2017-14496)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
A dnsmasqA A A A A A A A A A A A A A A A A A A A A A A A A 2.59-4ubuntu0.3
A dnsmasq-baseA A A A A A A A A A A A A A A A A A A A 2.59-4ubuntu0.3
A dnsmasq-utilsA A A A A A A A A A A A A A A A A A A 2.59-4ubuntu0.3

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
A https://www.ubuntu.com/usn/usn-3430-2
A https://www.ubuntu.com/usn/usn-3430-1
A CVE-2017-14491, CVE-2017-14492, CVE-2017-14493, CVE-2017-14494,
A CVE-2017-14495, CVE-2017-14496

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    2 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close