Home

Description

EN DE

A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

In dnsmasq up to 2.73rc6 wurde eine Schwachstelle gefunden. Dies betrifft die Funktion parse_dhcp_opt der Datei src/option.c der Komponente Config File Handler. Mit der Manipulation des Arguments m mit unbekannten Daten kann eine null pointer dereference-Schwachstelle ausgenutzt werden. Der Angriff erfordert einen lokalen Zugriff. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-10-25 | Published 2025-10-27 | Updated 2025-10-28 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
1.7AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR

Problem types

NULL Pointer Dereference

Denial of Service

Timeline

2025-10-25:Advisory disclosed
2025-10-25:VulDB entry created
2025-10-25:VulDB entry last update

Credits

zh_vul (VulDB User) reporter

References

vuldb.com/?id.329870 (VDB-329870 | dnsmasq Config File option.c parse_dhcp_opt null pointer dereference) vdb-entry technical-description

vuldb.com/?ctiid.329870 (VDB-329870 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.673155 (Submit #673155 | dnsmasq v2.73rc6 NULL Pointer Dereference) third-party-advisory

shimo.im/docs/5xkGoMo0WVfY4dkX/ exploit

cve.org (CVE-2025-12200)

nvd.nist.gov (CVE-2025-12200)

Download JSON