vulnerability
FreeBSD: VID-5b5cf6e5-5b51-11eb-95ac-7f9491278677 (CVE-2020-25683): dnsmasq -- DNS cache poisoning, and DNSSEC buffer overflow, vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | Jan 20, 2021 | Jan 21, 2021 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
Jan 20, 2021
Added
Jan 21, 2021
Modified
Dec 10, 2025
Description
Simon Kelley reports: There are broadly two sets of problems. The first is subtle errors in dnsmasq's protections against the chronic weakness of the DNS protocol to cache-poisoning attacks; the Birthday attack, Kaminsky, etc.[...] the second set of errors is a good old fashioned buffer overflow in dnsmasq's DNSSEC code. If DNSSEC validation is enabled, an installation is at risk.
Solutions
freebsd-upgrade-package-dnsmasqfreebsd-upgrade-package-dnsmasq-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.