Description
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26773 | A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity. |
Ubuntu USN |
USN-4976-1 | Dnsmasq vulnerability |
Ubuntu USN |
USN-4976-2 | Dnsmasq vulnerability |
References
History
Wed, 03 Dec 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-03T00:40:40.220Z
Reserved: 2021-03-16T00:00:00.000Z
Link: CVE-2021-3448
Updated: 2024-08-03T16:53:17.620Z
Status : Modified
Published: 2021-04-08T23:15:12.597
Modified: 2025-12-03T01:15:46.820
Link: CVE-2021-3448
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN