|Bugzilla:||833033: CVE-2012-3411 libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networks|
The MITRE CVE dictionary describes this issue as:
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
This issue affected the version of dnsmasq as shipped with Red Hat Enterprise Linux 6 and has been addressed via RHSA-2013:0277. This issue affects the version of dnsmasq as shipped with Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this issue as having moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 5.
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat security errata
|RHEV Hypervisor for RHEL-6 (rhev-hypervisor6)||RHSA-2013:0579||February 28, 2013|
|Red Hat Enterprise Linux version 6 (dnsmasq)||RHSA-2013:0277||February 20, 2013|
|Red Hat Enterprise Linux version 6 (libvirt)||RHSA-2013:0276||February 20, 2013|
This page is generated automatically and has not been checked for errors or omissions.
For clarification or corrections please contact the Red Hat Security Response Team.