BSA-2017-453
21621
24 December 2018
17 November 2017
Closed
High
7.5
N/A
CVE-2017-14495
Summary
Security Advisory ID : BSA-2017-453
Component : EDNS0
Revision : 2.0: Final
A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add-subnet.
Affected Products
No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.
Workaround
There are no workarounds that address this vulnerability.
Note
Brocade Manageability products are not vulnerable. However, since the environement that runs the products is not under Brocade's control, Brocade recommends Customers to apply recommendation from the vendors.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | November 17, 2017 |
2.0 | Update for Fibre Channel Only | December 24, 2018 |