{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25684", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "n/a", "product": { "product_data": [ { "product_name": "dnsmasq", "version": { "version_data": [ { "version_value": "dnsmasq 2.83" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889686" }, { "refsource": "MISC", "name": "https://www.jsof-tech.com/disclosures/dnspooq/", "url": "https://www.jsof-tech.com/disclosures/dnspooq/" }, { "refsource": "FEDORA", "name": "FEDORA-2021-84440e87ba", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYW3IR6APUSKOYKL5FT3ACTIHWHGQY32/" }, { "refsource": "GENTOO", "name": "GLSA-202101-17", "url": "https://security.gentoo.org/glsa/202101-17" }, { "refsource": "DEBIAN", "name": "DSA-4844", "url": "https://www.debian.org/security/2021/dsa-4844" }, { "refsource": "FEDORA", "name": "FEDORA-2021-2e4c3d5a9d", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGB7HL3OWHTLEPSMLDGOMXQKG3KM2QME/" }, { "refsource": "MLIST", "name": "[debian-lts-announce] 20210322 [SECURITY] [DLA 2604-1] dnsmasq security update", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00027.html" }, { "refsource": "MISC", "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12135-security-advisory-61" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query, substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452, which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686, the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity." } ] } }