Generated remediation guidance and an executive summary. No account required.
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
Use CWE-358, Thekelleys vendor hub and Dnsmasq product page to widen CVE-2021-3448 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-45957, CVE-2021-45956 and CVE-2021-45955 for nearby disclosures in the same product family.