Vulnerability Details : CVE-2012-3411
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2012-3411
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*
Threat overview for CVE-2012-3411
Top countries where our scanners detected CVE-2012-3411
Top open port discovered on systems with this issue
53
IPs affected by CVE-2012-3411 464,971
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-3411!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-3411
1.76%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-3411
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-3411
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3411
-
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=54dd393f3938fc0c19088fbd319b95e37d81a2b0
thekelleys.org.uk Git
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372
#683372 - CVE-2012-3411: libvirt-controlled dnsmasq replies to DNS queries from non-virtual networks - Debian Bug report logsIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2012/07/12/5
oss-security - Re: Re: CVE Request -- dnsmasq: When being run by libvirt open DNS proxy (reachable out-of the virtual network set for the particular guest domain too) is createdMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/54353
Dnsmasq Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://rhn.redhat.com/errata/RHSA-2013-0276.html
RHSA-2013:0276 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=2f38141f434e23292f84cefc33e8de76fb856147
thekelleys.org.uk Git
-
http://rhn.redhat.com/errata/RHSA-2013-0579.html
RHSA-2013:0579 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=833033
833033 – (CVE-2012-3411) CVE-2012-3411 libvirt+dnsmasq: DNS configured to answer DNS queries from non-virtual networksIssue Tracking;Patch;Third Party Advisory
-
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
Release Notes;Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:072
mandriva.comThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-0277.html
RHSA-2013:0277 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to