dnsmasq ଯେପର୍ଯ୍ୟନ୍ତ 2.73rc6 Config File src/option.c parse_dhcp_opt m ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ ⚔ [ପଚରାଉଚରା]

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame dnsmasq ଯେପର୍ଯ୍ୟନ୍ତ 2.73rc6 keessatti argameera. Miidhamni argame is hojii parse_dhcp_opt faayilii src/option.c keessa kutaa Config File Handler keessa. Wanti jijjiirame irratti m gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-476 si geessa. Odeeffannoon kun yeroo 10/25/2025 maxxanfameera. Odeeffannoon kun buufachuuf shimo.im irratti argama. Dogoggorri kun CVE-2025-12200 jedhamee waamama. Weerara sun naannoo keessaatti qofa raawwatamuu qaba. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit shimo.im irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. Jiraachuu balaa kanaa ammaaf hin mirkanaa’in jedhamee yaadama. Hanqinni kun bu'uuraalee odeeffannoo hanqina biroo keessatti argama: Tenable (276817). If you want to get best quality of vulnerability data, you may have to visit VulDB.

7 ଆଡାପ୍ଟେସନ୍ · 96 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 2/6
10/28/2025 04:29 AM
ଅଦ୍ୟତନ 3/6
11/03/2025 07:16 PM
ଅଦ୍ୟତନ 4/6
11/03/2025 11:52 PM
ଅଦ୍ୟତନ 5/6
11/17/2025 05:38 PM
ଅଦ୍ୟତନ 6/6
11/28/2025 05:27 PM
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.51.51.51.51.5
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.33.33.33.3
cvss3_meta_tempscore3.13.13.13.13.1
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_namednsmasqdnsmasqdnsmasqdnsmasqdnsmasq
software_version<=2.73rc6<=2.73rc6<=2.73rc6<=2.73rc6<=2.73rc6
software_componentConfig File HandlerConfig File HandlerConfig File HandlerConfig File HandlerConfig File Handler
software_filesrc/option.csrc/option.csrc/option.csrc/option.csrc/option.c
software_functionparse_dhcp_optparse_dhcp_optparse_dhcp_optparse_dhcp_optparse_dhcp_opt
software_argumentmmmmm
vulnerability_cweCWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/https://shimo.im/docs/5xkGoMo0WVfY4dkX/
source_cveCVE-2025-12200CVE-2025-12200CVE-2025-12200CVE-2025-12200CVE-2025-12200
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
software_typeDomain Name SoftwareDomain Name SoftwareDomain Name SoftwareDomain Name SoftwareDomain Name Software
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cve_nvd_summaryA vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was determined in dnsmasq up to 2.73rc6. Affected by this issue is the function parse_dhcp_opt of the file src/option.c of the component Config File Handler. This manipulation of the argument m causes null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avLLLLL
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcNNNNN
cvss4_cna_viNNNNN
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore4.84.84.84.84.8
cvss3_cna_avLLLLL
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cNNNNN
cvss3_cna_iNNNNN
cvss3_cna_aLLLLL
cvss3_cna_basescore3.33.33.33.33.3
cvss2_cna_avLLLLL
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciNNNNN
cvss2_cna_iiNNNNN
cvss2_cna_aiPPPPP
cvss2_cna_basescore1.71.71.71.71.7
euvd_idEUVD-2025-36059EUVD-2025-36059EUVD-2025-36059EUVD-2025-36059EUVD-2025-36059
advisory_disputed1111
decision_summaryThis attack requires manipulating config files which might not be a realistic scenario in many cases.Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.Based on the analysis by MITRE and review of community feedback, the reported conditions represent expected and intentional behavior within dnsmasq's documented design, rather than security vulnerabilities.
vulnerability_freeformenIn src/dnsmasq.c different exit codes are defined which are also explained in the man page. If dnsmasq is used within a tool-chain depending on these exit codes, even a simple crash might seriously break something that could have a security impact.In src/dnsmasq.c different exit codes are defined which are also explained in the man page. If dnsmasq is used within a tool-chain depending on these exit codes, even a simple crash might seriously break something that could have a security impact.
nessus_id276817
nessus_nameLinux Distros Unpatched Vulnerability : CVE-2025-12200 (deprecated)

Do you know our Splunk app?

Download it now for free!