CVE-2021-45954
NixOS vulnerability analysis and mitigation

Overview

CVE-2021-45954 is a disputed vulnerability reported in Dnsmasq version 2.86. The issue was identified as a heap-based buffer overflow in the extractname function, specifically when called from answerauth and FuzzAuth functions. The vulnerability was initially reported through Google's OSS-Fuzz project in July 2021 (OSS Fuzz Report, OSS Fuzz YAML). However, the vendor has disputed this vulnerability, stating that it does not represent a real vulnerability (Dnsmasq Discuss).

Technical details

The vulnerability was initially classified with a CVSS v3.1 Base Score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue was identified as a heap-based buffer overflow (CWE-787) in the extractname function when called from specific code paths including answerauth and FuzzAuth (NVD).

Impact

If exploitable, the heap-based buffer overflow could potentially lead to denial of service or arbitrary code execution. However, given the disputed nature of the vulnerability and the vendor's position, the actual impact may be minimal or non-existent (NVD).

Mitigation and workarounds

Given that the vendor has disputed this vulnerability and submitted a request to MITRE to cancel the CVE, no specific mitigations have been released. The vendor maintains that this and related CVEs (CVE-2021-45951 through CVE-2021-45957) do not represent real vulnerabilities (Dnsmasq Discuss).

Community reactions

Security researchers have engaged in discussions about the validity of this and related CVEs. A Red Hat engineer, Petr Menšík, investigated the issue and suggested that many of the reported vulnerabilities might be invalid due to incorrect fuzzing implementation (Dnsmasq Discuss).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14330CRITICAL9.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox_esr
NoYesDec 09, 2025
CVE-2025-14329HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesDec 09, 2025
CVE-2025-14333HIGH8.1
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14332HIGH7.3
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025
CVE-2025-14331MEDIUM6.5
  • NixOSNixOS
  • firefox
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management