Buffer Overflow Vulnerability in Dnsmasq-utils by Dnsmasq
CVE-2020-37127
6.9MEDIUM
Key Information:
- Vendor
Dnsmasq
- Status
- Vendor
- CVE Published:
- 5 February 2026
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2020-37127?
Dnsmasq-utils version 2.79-1 contains a buffer overflow vulnerability in the dhcp_release utility. This flaw allows attackers to send carefully crafted input exceeding 16 characters, leading to a denial of service. By triggering a core dump, the dhcp_release process can be terminated, potentially disrupting network operations.
Affected Version(s)
dnsmasq-utils 2.79
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Josue Encinar
