[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255861

 
 

909

 
 

199025

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-0198Date: (C)2013-03-06   (M)2023-12-22


Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
MDVSA-2013:072
http://www.openwall.com/lists/oss-security/2013/01/18/2
http://www.openwall.com/lists/oss-security/2013/01/18/7
http://www.thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commitdiff%3Bh=22ce550e5346947a12a781ed0959a7b1165d0dc6
https://bugzilla.redhat.com/show_bug.cgi?id=894486

CPE    1
cpe:/a:thekelleys:dnsmasq
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:104607
oval:org.secpod.oval:def:104623

© SecPod Technologies