Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/54353 | Third Party Advisory VDB Entry |
http://rhn.redhat.com/errata/RHSA-2013-0277.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/07/12/5 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=833033 | Issue Tracking Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0276.html | Third Party Advisory |
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG | Release Notes Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2013-0579.html | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:072 | Third Party Advisory |
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147 | |
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0 |
Information
Published : 2013-03-05 13:38
Updated : 2023-02-12 16:25
NVD link : CVE-2012-3411
Mitre link : CVE-2012-3411
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_workstation
thekelleys
- dnsmasq