First published: Fri Jun 26 2020(Updated: )
dnsmasq, as shipped with Fedora and Red Hat Enterprise Linux, has a default configuration that makes it listen on any interface and accept queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Users that enable dnsmasq on their system with its default configuration may inadvertently make it an open resolver accessible from any address on the internet, potentially being involved in Distributed Denial of Service (DDoS) attacks against a victim.
Affected Software | Affected Version | How to fix |
---|---|---|
dnsmasq | ||
dnsmasq |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1851342 is considered high due to its potential for unauthorized external access.
To fix REDHAT-BUG-1851342, users should modify the dnsmasq configuration to enable the 'local-service' option.
REDHAT-BUG-1851342 affects dnsmasq as shipped with Fedora and Red Hat Enterprise Linux.
The main risk of REDHAT-BUG-1851342 is that it allows dnsmasq to accept DNS queries from outside the local subnet, leading to potential data exposure.
A temporary workaround for REDHAT-BUG-1851342 is to restrict dnsmasq to listen only on the local interface.