CVE-2026-5172
Description
A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A heap out-of-bounds read in dnsmasq's extract_addresses() allows remote attackers to crash the DNS resolver via a crafted DNS response.
Vulnerability
Overview CVE-2026-5172 is a heap out-of-bounds read vulnerability in dnsmasq's extract_addresses() function. The root cause is a mismatched resource record (RR) rdlen value that allows extract_name() to advance the parsing pointer beyond the computed end of the record. This underflows the remaining-bytes calculation, resulting in a large out-of-bounds read that can crash the dnsmasq process [1][3].
Exploitation
A remote attacker can trigger the vulnerability by sending a malformed DNS response to a dnsmasq instance acting as a DNS resolver. No authentication or special network position is required; the attacker only needs to be able to deliver a crafted DNS packet to the target. The flaw is reachable without any prior validation, making it straightforward to exploit [1][2].
Impact
Successful exploitation causes a denial of service (DoS) by crashing the dnsmasq process. While the primary impact is service disruption, the out-of-bounds read could potentially leak memory contents under certain conditions, though the CVE description and references focus on the crash [1][3].
Mitigation
The vulnerability is fixed in dnsmasq version 2.92rel2, released on 11 May 2026 [2]. Vendors and downstream projects (e.g., Pi-hole FTL v6.6.2) have released patched versions [3]. Users should update their dnsmasq installation to the latest version or apply the vendor-supplied patch.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
4- ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and MoreThe Hacker News · May 18, 2026
- Week in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploitedHelp Net Security · May 17, 2026
- Researchers open-source a Wi-Fi cyber range for security trainingHelp Net Security · May 13, 2026
- APT28 exploit routers to enable DNS hijacking operationsNCSC UK · Apr 7, 2026