mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-15 03:30:24 +02:00
31 lines
1.3 KiB
Markdown
31 lines
1.3 KiB
Markdown
### [CVE-2017-14493](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://nvidia.custhelp.com/app/answers/detail/a_id/4561
|
|
- http://thekelleys.org.uk/dnsmasq/CHANGELOG
|
|
- https://security.googleblog.com/2017/10/behind-masq-yet-more-dns-and-dhcp.html
|
|
- https://www.exploit-db.com/exploits/42943/
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/TheRipper2092/network-security-assessment
|
|
- https://github.com/introspection-libc/main
|
|
- https://github.com/introspection-libc/safe-libc
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/pekd/safe-libc
|
|
- https://github.com/pupiles/bof-dnsmasq-cve-2017-14493
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/raw-packet/raw-packet
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
|