5
CVSSv2

CVE-2012-3411

Published: 05/03/2013 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Dnsmasq prior to 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote malicious users to cause a denial of service (traffic amplification) via a spoofed DNS query.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

thekelleys dnsmasq

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

Vendor Advisories

Debian Bug report logs - #683372 CVE-2012-3411: libvirt-controlled dnsmasq replies to DNS queries from non-virtual networks Package: dnsmasq; Maintainer for dnsmasq is Simon Kelley <simon@thekelleysorguk>; Source for dnsmasq is src:dnsmasq (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde& ...
Synopsis Moderate: dnsmasq security, bug fix and enhancement update Type/Severity Security Advisory: Moderate Topic Updated dnsmasq packages that fix one security issue, one bug, and addvarious enhancements are now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this up ...
Synopsis Moderate: libvirt security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated libvirt packages that fix one security issue, multiple bugs, andadd various enhancements are now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated ...
Synopsis Important: rhev-hypervisor6 security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes three security issues,various bugs, and adds an enhancement is now availableThe Red Hat Security Response Team has rated this update ...
It was discovered that dnsmasq, when used in combination with certain libvirtd configurations, could incorrectly process network packets from network interfaces that were intended to be prohibited A remote, unauthenticated attacker could exploit this flaw to cause a denial of service via DNS amplification attacks (CVE-2012-3411) ...