Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 12 Jul 2008 08:28:07 -0400
From: Jamie Strandboge <>
Subject: Re: CVE request for dnsmasq DoS

On Thu, 03 Jul 2008, Jamie Strandboge wrote:

> On Tue, 01 Jul 2008, Steven M. Christey wrote:
> > I'm not sure I fully understand Thierry Carrez' comment about the security
> > implications of this issue.  It seems like an exploit would require a
> > malicious DHCP server, in which case isn't DHCP service already
> > compromised?  If so, then a crash of dnsmasq (null dereference?) doesn't
> > seem to be any worse than the loss of DHCP itself.
> > 
> I haven't had time to develop a PoC, but from the dnsmasq 2.26 announce
> page at [1], a client need only send a crafted renewal request to crash
> the server. Thierry's comments were only for trying to reproduce the
> problem and test the patch.
(resending as the first one didn't make it to the list)

I finally had time to develop a PoC and confirm this on my own. A client
need only send a DHCPREQUEST for an IP address not on the same network
as dnsmasq. Eg:

1. dnsmasq listening on and giving IP addresses for
2. client requests IP address on another network, such as
3. dnsmasq 2.25 (and presumably earlier) crashes

This can happen in normal operation with roaming users, but can also
happen with a malicious request. Attached is a script to easily test for
this (requires python scapy).


Ubuntu Security Engineer     |
Canonical Ltd.               |

View attachment "" of type "text/x-python" (1928 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ