
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-45952 affects Dnsmasq version 2.86, involving a heap-based buffer overflow vulnerability in the dhcpreply function (called from dhcppacket and FuzzDhcp). This vulnerability is currently disputed, as the vendor has stated that this and related CVEs (CVE-2021-45951 through CVE-2021-45957) "do not represent real vulnerabilities" (Dnsmasq Discuss). The issue was initially discovered through OSS-Fuzz testing (OSS Fuzz).
The vulnerability was assigned a CVSS v3.1 Base Score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue specifically involves a heap-based buffer overflow condition in the dhcpreply function, which is triggered through the dhcppacket call chain (NVD). The vulnerability is classified under CWE-787 (Out-of-bounds Write).
If exploited, this heap-based buffer overflow vulnerability could potentially allow attackers to cause memory corruption, leading to program crashes or possible code execution. However, given the disputed status of the vulnerability, the real-world impact may be limited (NVD).
While initially reported as a security issue, the Dnsmasq project maintainer has submitted a request to MITRE to cancel this CVE along with related ones, stating they do not represent real vulnerabilities (Dnsmasq Discuss). Some security researchers have suggested that the reported issues might be related to incomplete initialization during fuzzing rather than actual security vulnerabilities (Dnsmasq Discuss).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."