PT-2026-39702 · Dnsmasq · Dnsmasq
Hugo Martinez
·
Published
2026-05-11
·
Updated
2026-05-11
·
CVE-2026-5172
CVSS v3.1
7.3
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
Name of the Vulnerable Software and Affected Versions
dnsmasq (affected versions not specified)
Description
A buffer overflow in the
extract addresses() function allows an attacker to trigger a heap out-of-bounds read and cause a crash. This occurs when a malformed DNS response is processed, enabling the extract name() function to advance the pointer beyond the end of the record.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Dnsmasq