Loading
Generated remediation guidance and an executive summary. No account required.
The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
Use CWE-19, Thekelleys vendor hub and Dnsmasq product page to widen CVE-2015-3294 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-45957, CVE-2021-45956 and CVE-2021-45955 for nearby disclosures in the same product family.