EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in dnsmasq, an open-source networking tool that handles DNS forwarding, DHCP, and network boot services for millions of users. The vulnerabilities, collectively tracked across six CVEs (CVE-2026-2291, CVE-2026-4890, CVE-2026-4891, CVE-2026-4892, CVE-2026-4893, and CVE-2026-5172), enable attackers to poison DNS caches, bypass security controls, and achieve local privilege escalation. The reported issues range from heap buffer overflows to infinite loops, each providing a different lever for an attacker to destabilize a network. The business risk and impact are significant, as a successful exploit can redefine the network's reality, redirect users to malicious domains, disclose internal memory and network information, and terminate DNS resolution and dependent services. This could have severe consequences for businesses and individuals, including financial loss, reputational damage, and compromised network security.[/subscribe_to_unlock_form]
EXECUTIVE SUMMARY:
Multiple security vulnerabilities have been identified in dnsmasq, an open-source networking tool that handles DNS forwarding, DHCP, and network boot services for millions of users. The vulnerabilities, collectively tracked across six CVEs (CVE-2026-2291, CVE-2026-4890, CVE-2026-4891, CVE-2026-4892, CVE-2026-4893, and CVE-2026-5172), enable attackers to poison DNS caches, bypass security controls, and achieve local privilege escalation. The reported issues range from heap buffer overflows to infinite loops, each providing a different lever for an attacker to destabilize a network. The business risk and impact are significant, as a successful exploit can redefine the network's reality, redirect users to malicious domains, disclose internal memory and network information, and terminate DNS resolution and dependent services. This could have severe consequences for businesses and individuals, including financial loss, reputational damage, and compromised network security.[emaillocker id="1283"]
A successful exploit can redefine the network's reality, redirect users to malicious domains, disclose internal memory and network information, and terminate DNS resolution and dependent services. This could have severe consequences, including financial loss, reputational damage, and compromised network security.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details:
https://securityonline.info/multiple-memory-flaws-in-dnsmasq-threaten-millions-of-connected-devices/