CVE-2012-3411

Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372 Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0276.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0277.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0579.html Third Party Advisory
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0
http://www.mandriva.com/security/advisories?name=MDVSA-2013:072 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/07/12/5 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/54353 Third Party Advisory VDB Entry
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG Release Notes Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=833033 Issue Tracking Patch Third Party Advisory
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372 Issue Tracking Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0276.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0277.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0579.html Third Party Advisory
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0
http://www.mandriva.com/security/advisories?name=MDVSA-2013:072 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/07/12/5 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/54353 Third Party Advisory VDB Entry
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG Release Notes Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=833033 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-03-05 21:38

Updated : 2025-04-11 00:51


NVD link : CVE-2012-3411

Mitre link : CVE-2012-3411

CVE.ORG link : CVE-2012-3411


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_server
  • enterprise_linux_desktop

thekelleys

  • dnsmasq
CWE
CWE-20

Improper Input Validation