![]() ![]() These vulnerabilities could allow a remote attacker to execute code on, leak information from, or crash a running Dnsmasq service. ![]() Given the ubiquity of embedded systems, these three small software packages are becoming more and more critical.īetween September 24 and 25, Simon Kelley, the developer of Dnsmasq, pushed seven fixes to the Git repository to address seven vulnerabilities privately disclosed by Google Security researchers. In other words, if an embedded-Linux device offers DNS/DHCP services and an SSH-accessible console, Dnsmasq, BusyBox, and DropBear are all likely to be present. Its flexibility and lightweight footprint have made it a part of the classic embedded-Linux software combo, which usually includes BusyBox and DropBear. ![]() What are the recent Dnsmasq vulnerabilities?First released around 2001, Dnsmasq has become an essential part of routers and IoT gateways because it provides a network's two most essential functions: DHCP and DNS. Steps for checking if your Dnsmasq deployment is potentially vulnerable, and suggested solutions (Click to enlarge) The flowchart below serves as a quick guide for determining if an embedded system is vulnerable:įigure 1.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |