Unrated severityNVD Advisory· Published Mar 5, 2013· Updated Apr 29, 2026
CVE-2012-3411
CVE-2012-3411
Description
Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Affected products
4- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- bugs.debian.org/cgi-bin/bugreport.cginvdIssue TrackingThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-0276.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-0277.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2013-0579.htmlnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2012/07/12/5nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/54353nvdThird Party AdvisoryVDB Entry
- www.thekelleys.org.uk/dnsmasq/CHANGELOGnvdRelease NotesVendor Advisory
News mentions
0No linked articles in our index yet.