CVE-2013-0198
Published: March 5, 2013Last modified: November 10, 2023
Description
Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | dnsmasq | Not affected (2.87-r2) |
Stream | dnsmasq | Not affected (2.89-r6) |
References
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:072
- http://www.openwall.com/lists/oss-security/2013/01/18/2
- http://www.openwall.com/lists/oss-security/2013/01/18/7
- http://www.thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=22ce550e5346947a12a781ed0959a7b1165d0dc6
- https://bugzilla.redhat.com/show_bug.cgi?id=894486