A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6264-1 | dnsmasq security update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 11 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dnsmasq
Dnsmasq dnsmasq |
|
| Weaknesses | CWE-125 | |
| Vendors & Products |
Dnsmasq
Dnsmasq dnsmasq |
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A buffer overflow in dnsmasq’s extract_addresses() function allows an attacker to trigger a heap out-of-bounds read and crash by exploiting a malformed DNS response, enabling extract_name() to advance the pointer past the record’s end. | |
| Title | CVE-2026-5172 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-05-11T19:57:28.843Z
Reserved: 2026-03-30T15:54:52.205Z
Link: CVE-2026-5172
No data.
Status : Received
Published: 2026-05-11T18:16:41.920
Modified: 2026-05-11T21:19:03.053
Link: CVE-2026-5172
No data.
OpenCVE Enrichment
Updated: 2026-05-11T18:45:25Z
Weaknesses
Debian DSA