PT-2026-39702 · Dnsmasq · Dnsmasq

Hugo Martinez

·

Published

2026-05-11

·

Updated

2026-05-11

·

CVE-2026-5172

CVSS v3.1

7.3

High

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Name of the Vulnerable Software and Affected Versions dnsmasq (affected versions not specified)
Description A buffer overflow in the extract addresses() function allows an attacker to trigger a heap out-of-bounds read and cause a crash. This occurs when a malformed DNS response is processed, enabling the extract name() function to advance the pointer beyond the end of the record.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2026-5172

Affected Products

Dnsmasq