CVE-2013-0198

Source
https://nvd.nist.gov/vuln/detail/CVE-2013-0198
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2013-0198.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2013-0198
Published
2013-03-05T21:38:54Z
Modified
2024-11-21T01:47:02Z
Summary
[none]
Details

Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411.

References

Affected packages

Debian:11 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:deb/debian/dnsmasq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:deb/debian/dnsmasq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / dnsmasq

Package

Name
dnsmasq
Purl
pkg:deb/debian/dnsmasq?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.66-1

Ecosystem specific

{
    "urgency": "low"
}