{"id":"CVE-2015-3294","details":"The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.","modified":"2026-01-27T04:14:59.440414Z","published":"2015-05-08T14:59:05Z","withdrawn":"2026-01-27T04:14:59.440414Z","related":["MGASA-2015-0214","SUSE-SU-2015:0979-1","SUSE-SU-2015:0979-2","SUSE-SU-2015:1015-1","SUSE-SU-2017:2616-1","SUSE-SU-2017:2617-1","SUSE-SU-2017:2619-1","openSUSE-SU-2024:10195-1"],"references":[{"type":"ADVISORY","url":"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009387.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3251"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2593-1"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201512-01"},{"type":"EVIDENCE","url":"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009382.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-05/msg00013.html"},{"type":"WEB","url":"http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=ad4a8ff7d9097008d7623df8543df435bfddeac8"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/535354/100/1100/threaded"},{"type":"WEB","url":"http://www.securityfocus.com/bid/74452"},{"type":"WEB","url":"http://www.securitytracker.com/id/1032195"}],"schema_version":"1.7.3"}