Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aP_msOoiyHJ_M4Yx@mertle>
Date: Mon, 27 Oct 2025 17:40:00 -0400
From: Michael Orlitzky <michael@...itzky.com>
To: oss-security@...ts.openwall.com
Subject: Re: Questionable CVE's reported against dnsmasq

On 2025-10-27 19:21:54, Moritz Mühlenhoff wrote:
> On Mon, Oct 27, 2025 at 09:34:03AM -0700, Alan Coopersmith wrote:
> > Among the new CVE's published this weekend were these from the VulDB CNA:
> > 
> > For all three bugs, the documented "exploit" requires "Replace the default
> > configuration file (/etc/dnsmasq.conf) with the provided malicious file."
> > and if you can replace the server's configuration file you don't need to
> > play games with putting invalid contents in to break the parser, but can
> > simply change the configuration directly.
> 
> The same nonsense also happened for the Kamailio SIP server (CVE-2025-12204,
> CVE-2025-12205, CVE-2025-12206 and CVE-2025-12207).

Config parser exploits are not necessarily bogus. The admin might
allow group/ACL edits to the configuration files knowing that it
allows group members to torch the service in question, while, at the
same time, not trusting those group members to execute arbitrary
commands as root.

If the daemon is launched as an unprivileged user (before reading the
config file) the risk is minimized, but often that isn't the case when
you want to bind to privileged ports or read private keys that are
defined in the config file.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.