Home

Description

EN DE

A vulnerability has been found in dnsmasq up to 2.73rc6. Affected is the function parse_hex of the file src/util.c of the component Config File Handler. The manipulation of the argument i leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in dnsmasq up to 2.73rc6 gefunden. Es betrifft die Funktion parse_hex der Datei src/util.c der Komponente Config File Handler. Dank der Manipulation des Arguments i mit unbekannten Daten kann eine heap-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs hat dabei lokal zu erfolgen. Der Exploit ist öffentlich verfügbar und könnte genutzt werden.

PUBLISHED Reserved 2025-10-25 | Published 2025-10-27 | Updated 2025-10-27 | Assigner VulDB




HIGH: 8.5CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 7.8CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
6.8AV:L/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Heap-based Buffer Overflow

Memory Corruption

Timeline

2025-10-25:Advisory disclosed
2025-10-25:VulDB entry created
2025-10-25:VulDB entry last update

Credits

zh_vul (VulDB User) reporter

References

vuldb.com/?id.329868 (VDB-329868 | dnsmasq Config File util.c parse_hex heap-based overflow) vdb-entry technical-description

vuldb.com/?ctiid.329868 (VDB-329868 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.673138 (Submit #673138 | dnsmasq dnsmasq v2.73rc6 Heap-based Buffer Overflow) third-party-advisory

shimo.im/docs/1d3aMVMmNmiLjg3g/ exploit

cve.org (CVE-2025-12198)

nvd.nist.gov (CVE-2025-12198)

Download JSON