| Summary | dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS. |
|---|---|
| Publication Date | May 12, 2026, 3:16 a.m. |
| Registration Date | May 12, 2026, 4:14 a.m. |
| Last Update | May 12, 2026, 3:16 a.m. |