<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6507 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6507/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 17 Apr 2026 13:16:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6507/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dnsmasq Out-of-Bounds Write Vulnerability (CVE-2026-6507)</title><link>https://feed.craftedsignal.io/briefs/2026-04-dnsmasq-dos/</link><pubDate>Fri, 17 Apr 2026 13:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dnsmasq-dos/</guid><description>A remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-6507) in dnsmasq by sending a specially crafted BOOTREPLY packet to a server configured with the `--dhcp-split-relay` option, leading to a denial of service.</description><content:encoded><![CDATA[<p>CVE-2026-6507 is an out-of-bounds write vulnerability affecting dnsmasq. The vulnerability is triggered when a dnsmasq server is configured with the <code>--dhcp-split-relay</code> option and receives a specially crafted BOOTREPLY packet from a remote attacker. Successful exploitation results in memory corruption, causing the dnsmasq daemon to crash and leading to a denial of service (DoS) condition. This vulnerability poses a significant threat to organizations relying on dnsmasq for DNS and DHCP services, potentially disrupting network connectivity and availability. The vulnerability was reported on April 17, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target dnsmasq server running with the <code>--dhcp-split-relay</code> option enabled.</li>
<li>Attacker crafts a malicious BOOTREPLY packet specifically designed to trigger the out-of-bounds write vulnerability.</li>
<li>The attacker sends the crafted BOOTREPLY packet to the targeted dnsmasq server.</li>
<li>The dnsmasq server processes the malicious packet, leading to an out-of-bounds write in memory.</li>
<li>Memory corruption occurs due to the out-of-bounds write.</li>
<li>The dnsmasq daemon encounters a critical error due to the memory corruption.</li>
<li>The dnsmasq daemon crashes, interrupting DNS and DHCP services.</li>
<li>Legitimate clients are unable to resolve domain names or obtain IP addresses, resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6507 leads to a denial-of-service condition, disrupting network connectivity and potentially affecting all clients relying on the vulnerable dnsmasq server for DNS and DHCP services. The impact ranges from temporary network outages to complete service unavailability, depending on the criticality of the affected dnsmasq instance. The number of affected systems will vary based on the prevalence of dnsmasq deployments with the <code>--dhcp-split-relay</code> option enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to a non-vulnerable version of dnsmasq as provided by the vendor to remediate CVE-2026-6507 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6507)">https://nvd.nist.gov/vuln/detail/CVE-2026-6507)</a>.</li>
<li>Disable the <code>--dhcp-split-relay</code> option in dnsmasq configuration if it is not required, mitigating the attack vector (<a href="https://nvd.nist.gov/vuln/detail/CVE-2026-6507)">https://nvd.nist.gov/vuln/detail/CVE-2026-6507)</a>.</li>
<li>Monitor network traffic for malformed BOOTREPLY packets targeting dnsmasq servers, using the &ldquo;Detect Malformed BOOTREPLY Packets&rdquo; Sigma rule.</li>
<li>Enable process crash monitoring on systems running dnsmasq to detect potential crashes resulting from exploitation attempts, using the &ldquo;Detect Dnsmasq Process Crash&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dnsmasq</category><category>denial-of-service</category><category>cve-2026-6507</category></item></channel></rss>