Dnsmasq Vulnerability Allows Remote DoS via Crafted BOOTREPLY

Dnsmasq Vulnerability Allows Remote DoS via Crafted BOOTREPLY

The National Vulnerability Database has identified CVE-2026-6507, a critical flaw in the widely used dnsmasq network utility. Attackers can trigger an out-of-bounds write by sending a malicious BOOTREPLY packet to a dnsmasq server specifically configured with the --dhcp-split-relay option. This vulnerability leads to memory corruption and can cause the dnsmasq daemon to crash, resulting in a denial-of-service condition.

This flaw, rated HIGH with a CVSS score of 7.5, presents a significant risk to network availability. While the National Vulnerability Database has not specified affected products beyond dnsmasq itself, any environment utilizing this DHCP and DNS caching server, particularly with the --dhcp-split-relay configuration, is exposed. Defenders must prioritize patching dnsmasq instances or implementing strict network segmentation and traffic filtering to prevent the delivery of malformed BOOTREPLY packets.

What This Means For You

  • If your organization uses dnsmasq, especially with the `--dhcp-split-relay` option enabled, you must immediately assess your exposure to CVE-2026-6507. Prioritize patching dnsmasq to the latest secure version. As a mitigating control, consider implementing network access controls or firewall rules to block unexpected or malformed BOOTREPLY packets from reaching your dnsmasq servers.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1499 Impact

DoS Traffic Pattern Detection

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6507 DoS dnsmasq daemon crash
CVE-2026-6507 Memory Corruption dnsmasq out-of-bounds write vulnerability
CVE-2026-6507 DoS dnsmasq server configured with --dhcp-split-relay option
CVE-2026-6507 Memory Corruption Specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 17, 2026 at 16:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6492 — Arnobt78 Hotel Booking Management System Information Disclosure

CVE-2026-6492 — A vulnerability was detected in arnobt78 Hotel Booking Management System up to f8922d0e0f6ac1cc761974c7616f44c2bbc04bea. The impacted element is an unknown function of the file...

vulnerabilityCVEmedium-severityinformation-disclosurecwe-200cwe-284
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 4 Sigma

CVE-2026-6491 — Libvips Buffer Overflow

CVE-2026-6491 — A security vulnerability has been detected in libvips up to 8.18.2. The affected element is the function im_minpos_vec of the file libvips/deprecated/vips7compat.c of...

vulnerabilityCVEmedium-severitybuffer-overflowcwe-119cwe-122
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 6 Sigma

SQL Injection Flaw in QueryMine SMS: Remote Exploitation Possible

CVE-2026-6490 — A weakness has been identified in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. Impacted is an unknown function of the file admin/deletecourse.php of the component...

vulnerabilityCVEhigh-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 7 Sigma