
Cloud Vulnerability DB
A community-led vulnerabilities database
Dnsmasq 2.86 contains a heap-based buffer overflow vulnerability in the checkbadaddress function (called from checkforbogus_wildcard and FuzzCheckForBogusWildcard). This vulnerability was assigned CVE-2021-45951 and was discovered through the OSS-Fuzz project. However, this vulnerability is disputed, as the vendor has stated that it does not represent a real vulnerability (Dnsmasq Mailing List).
The vulnerability is classified as a heap-based buffer overflow (CWE-787: Out-of-bounds Write) in the checkbadaddress function. The issue was identified through fuzzing tests and received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
If exploited, this heap-based buffer overflow vulnerability could potentially lead to code execution, system crashes, or memory corruption. However, given that the vendor disputes the validity of this vulnerability, the real-world impact may be minimal (OSS-Fuzz Report).
The vendor has disputed the validity of this vulnerability, stating that it does not represent a real vulnerability. A request has been submitted to MITRE to cancel the CVE (Dnsmasq Mailing List).
The vulnerability has generated discussion in the Dnsmasq mailing list, where developers have investigated the issue through fuzzing tests. Some security researchers suggest that many of the reported issues might be invalid due to incorrect fuzzing initialization (Dnsmasq Mailing List).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."