VYPR
Critical severity9.8NVD Advisory· Published Oct 4, 2017· Updated May 13, 2026

CVE-2017-14491

CVE-2017-14491

Description

Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.

Affected products

37
  • cpe:2.3:a:nvidia:geforce_experience:*:*:*:*:*:*:*:*
    Range: >=3.0,<3.10.0.55
  • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*
    • cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*
  • cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*
  • cpe:2.3:a:synology:router_manager:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*
    Range: <=2.77
  • cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
    Range: <=4.15
  • cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
    Range: >=6.3.1,<6.3.1.25
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*+ 4 more
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:huawei:honor_v9_play_firmware:*:*:*:*:*:*:*:*
    Range: <jimmy-al00ac00b135
  • cpe:2.3:o:nvidia:linux_for_tegra:*:*:*:*:*:*:*:*
    Range: <r21.6
  • OpenSUSE/Leap2 versions
    cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • cpe:2.3:o:siemens:ruggedcom_rm1224_firmware:*:*:*:*:*:*:*:*
    Range: <5.0
  • cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*
    Range: <5.0
  • cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*
    Range: <5.0
  • cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*
    Range: <6.5.1.5
  • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*+ 2 more
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
    • cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*
  • cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*
    • cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*
    • cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

39

News mentions

0

No linked articles in our index yet.