Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-0934: CWE-416 - Use After Free in dnsmasq

0
High
VulnerabilityCVE-2022-0934cvecve-2022-0934cwe-416
Published: Mon Aug 29 2022 (08/29/2022, 14:03:02 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: dnsmasq

Description

A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 07/11/2025, 02:01:37 UTC

Technical Analysis

CVE-2022-0934 is a high-severity vulnerability classified as a Use After Free (CWE-416) flaw found in dnsmasq, a widely used lightweight DNS forwarder and DHCP server software. The vulnerability involves a single-byte, non-arbitrary write/use-after-free condition triggered when dnsmasq processes a specially crafted network packet. This flaw can lead to a denial of service (DoS) by causing dnsmasq to crash or become unresponsive. The vulnerability does not affect confidentiality or integrity directly but impacts availability significantly. The CVSS 3.1 score of 7.5 reflects the ease of exploitation (network vector, no privileges or user interaction required) and the high impact on availability. Although the affected versions are not explicitly listed, dnsmasq is commonly deployed in routers, embedded devices, and Linux-based systems, making the attack surface broad. No known exploits in the wild have been reported as of the publication date. The vulnerability arises from improper memory management where dnsmasq frees memory but continues to use it, leading to undefined behavior and potential application crashes. This type of flaw is critical in network-facing services like dnsmasq because it can be triggered remotely without authentication, increasing the risk of widespread disruption.

Potential Impact

For European organizations, the impact of CVE-2022-0934 can be significant, especially for those relying on dnsmasq in their network infrastructure, including ISPs, enterprises, and critical infrastructure providers. A successful exploitation can cause denial of service on DNS and DHCP services, leading to network outages, loss of connectivity, and disruption of business operations. This can affect internal networks, customer-facing services, and IoT deployments. Given dnsmasq’s prevalence in embedded devices and routers, the vulnerability could also be exploited to disrupt home and small office networks, indirectly impacting remote workers and smaller businesses. The lack of confidentiality or integrity impact reduces the risk of data breaches, but the availability impact alone can cause operational and reputational damage. Additionally, disruption in DNS services can cascade to affect other dependent services and applications, amplifying the impact. European organizations in sectors such as telecommunications, finance, healthcare, and government are particularly sensitive to network availability issues and may face regulatory scrutiny if service disruptions occur.

Mitigation Recommendations

To mitigate CVE-2022-0934, organizations should: 1) Identify all instances of dnsmasq in their environment, including embedded devices and network appliances. 2) Apply vendor-provided patches or updates as soon as they become available; if no official patch exists, consider upgrading to the latest stable dnsmasq version where the issue is resolved. 3) Implement network-level protections such as filtering or blocking suspicious or malformed DNS and DHCP packets at perimeter firewalls and intrusion prevention systems to reduce exposure to crafted packets. 4) Monitor dnsmasq logs and network traffic for anomalies indicative of exploitation attempts or crashes. 5) For critical infrastructure, consider deploying redundant DNS/DHCP services to maintain availability during potential attacks. 6) Engage with device vendors to ensure firmware updates addressing this vulnerability are applied promptly. 7) Conduct regular vulnerability assessments and penetration testing focusing on network services to detect and remediate similar memory management issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2022-03-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f581b0bd07c3938a90b

Added to database: 6/10/2025, 6:54:16 PM

Last enriched: 7/11/2025, 2:01:37 AM

Last updated: 3/24/2026, 9:22:40 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses