|
|
Message-ID: <aP_msOoiyHJ_M4Yx@mertle> Date: Mon, 27 Oct 2025 17:40:00 -0400 From: Michael Orlitzky <michael@...itzky.com> To: oss-security@...ts.openwall.com Subject: Re: Questionable CVE's reported against dnsmasq On 2025-10-27 19:21:54, Moritz Mühlenhoff wrote: > On Mon, Oct 27, 2025 at 09:34:03AM -0700, Alan Coopersmith wrote: > > Among the new CVE's published this weekend were these from the VulDB CNA: > > > > For all three bugs, the documented "exploit" requires "Replace the default > > configuration file (/etc/dnsmasq.conf) with the provided malicious file." > > and if you can replace the server's configuration file you don't need to > > play games with putting invalid contents in to break the parser, but can > > simply change the configuration directly. > > The same nonsense also happened for the Kamailio SIP server (CVE-2025-12204, > CVE-2025-12205, CVE-2025-12206 and CVE-2025-12207). Config parser exploits are not necessarily bogus. The admin might allow group/ACL edits to the configuration files knowing that it allows group members to torch the service in question, while, at the same time, not trusting those group members to execute arbitrary commands as root. If the daemon is launched as an unprivileged user (before reading the config file) the risk is minimized, but often that isn't the case when you want to bind to privileged ports or read private keys that are defined in the config file.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.