{"id":"UBUNTU-CVE-2015-3294","details":"The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.","modified":"2026-01-30T02:20:37.055399Z","published":"2015-04-27T00:00:00Z","related":["USN-2593-1"],"upstream":["CVE-2015-3294"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3294"},{"type":"REPORT","url":"http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2015q2/009382.html"},{"type":"REPORT","url":"https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1502/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2593-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-3294"}],"affected":[{"package":{"name":"dnsmasq","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/dnsmasq@2.68-1ubuntu0.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.68-1ubuntu0.1"}]}],"versions":["2.66-4ubuntu1","2.67-1","2.68-1"],"ecosystem_specific":{"binaries":[{"binary_name":"dnsmasq","binary_version":"2.68-1ubuntu0.1"},{"binary_name":"dnsmasq-base","binary_version":"2.68-1ubuntu0.1"},{"binary_name":"dnsmasq-utils","binary_version":"2.68-1ubuntu0.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-3294.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}