CVE-2013-0198
Publication date 5 March 2013
Last updated 24 July 2024
Ubuntu priority
Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411.
Status
Package | Ubuntu Release | Status |
---|---|---|
dnsmasq | 16.04 LTS xenial |
Fixed 2.65-1ubuntu1
|
14.04 LTS trusty |
Fixed 2.65-1ubuntu1
|
|
Notes
mdeslaur
may introduce changes in behaviour, see https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/1126488 we will not be fixing this in Ubuntu 12.04 LTS, users in environments where this issue is problematic are recommended to upgrade to a more recent LTS release.
Patch details
Package | Patch details |
---|---|
dnsmasq |