First published: Mon Jun 18 2012(Updated: )
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
dnsmasq | <=2.62 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3411 has a severity associated with denial of service due to potential traffic amplification.
To fix CVE-2012-3411, update to a version of dnsmasq newer than 2.63test1.
CVE-2012-3411 affects users of dnsmasq versions prior to 2.63test1, especially with specific libvirt configurations.
CVE-2012-3411 facilitates denial of service attacks through traffic amplification via spoofed DNS queries.
CVE-2012-3411 is a remote vulnerability that allows attackers to exploit it from a distance.