ID

VAR-201303-0197


CVE

CVE-2013-0198


TITLE

Dnsmasq Service disruption in ( Traffic amplification ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-001751

DESCRIPTION

Dnsmasq before 2.66test2, when used with certain libvirt configurations, replies to queries from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via spoofed TCP based DNS queries. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3411. Dnsmasq is prone to multiple denial-of-service vulnerabilities. An attacker can exploit these issues to cause denial-of-service conditions through a large stream of spoofed DNS queries. Dnsmasq versions 2.62 and prior are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2013:072 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : dnsmasq Date : April 8, 2013 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated dnsmasq packages fix security vulnerabilities: When dnsmasq before 2.63 is used in conjunctions with certain configurations of libvirtd, network packets from prohibited networks (e.g. packets that should not be passed in) may be sent to the dnsmasq application and processed. This can result in DNS amplification attacks for example (CVE-2012-3411). This update adds a new option --bind-dynamic which is immune to this problem. Updated dnsmasq packages fix security vulnerabilities (CVE-2013-0198): This update completes the fix for CVE-2012-3411 provided with dnsmasq-2.63. This update fix these three cases. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3411 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0198 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0273 https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0030 _______________________________________________________________________ Updated Packages: Mandriva Business Server 1/X86_64: 89bdd7af8963a0c0e51a52b5b08295b0 mbs1/x86_64/dnsmasq-2.63-1.mbs1.x86_64.rpm 1b45290efb8694734cfa1616b5ef6294 mbs1/x86_64/dnsmasq-base-2.63-1.mbs1.x86_64.rpm 8782b678c40e2c8ccedb39f60e2b6f0d mbs1/SRPMS/dnsmasq-2.63-1.mbs1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFRYvSNmqjQ0CJFipgRAmDuAKDqB4WerX13N+7g/zR6iU5C6b8QjACdEdEW koGb8Voa5rhgjjRVCT1ZvBg= =VQ4h -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201406-24 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Dnsmasq: Denial of Service Date: June 25, 2014 Bugs: #436894, #453170 ID: 201406-24 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== A vulnerability in Dnsmasq can lead to a Denial of Service condition. Background ========== Dnsmasq is a lightweight, easy to configure DNS forwarder and DHCP server. Workaround ========== There is no known workaround at this time. Resolution ========== All Dnsmasq users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.66" References ========== [ 1 ] CVE-2012-3411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3411 [ 2 ] CVE-2013-0198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0198 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201406-24.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.07

sources: NVD: CVE-2013-0198 // JVNDB: JVNDB-2013-001751 // BID: 57458 // PACKETSTORM: 121148 // PACKETSTORM: 127218

AFFECTED PRODUCTS

vendor:thekelleysmodel:dnsmasqscope:lteversion:2.65

Trust: 1.0

vendor:thekelleysmodel:dnsmasqscope:ltversion:2.66test2

Trust: 0.8

vendor:thekelleysmodel:dnsmasqscope:eqversion:2.47

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:2.41

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:1.8

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:1.6

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:2.46

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:2.42

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:1.7

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:1.5

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:2.45

Trust: 0.6

vendor:thekelleysmodel:dnsmasqscope:eqversion:2.48

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.29

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.22

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.21

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.20

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.19

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.18

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.17

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.16

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.15

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.14

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.13

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.12

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.11

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.50

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.49

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.48

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.47

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.46

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.45

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.44

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.43

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.42

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.41

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.40

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.35

Trust: 0.3

vendor:dnsmasqmodel:dnsmasqscope:eqversion:2.30

Trust: 0.3

sources: BID: 57458 // JVNDB: JVNDB-2013-001751 // CNNVD: CNNVD-201301-396 // NVD: CVE-2013-0198

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0198
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-0198
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201301-396
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2013-0198
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2013-001751 // CNNVD: CNNVD-201301-396 // NVD: CVE-2013-0198

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

sources: NVD: CVE-2013-0198

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-396

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201301-396

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001751

PATCH

title:Bug 894486url:https://bugzilla.redhat.com/show_bug.cgi?id=894486

Trust: 0.8

title:MDVSA-2013:072url:http://www.mandriva.com/security/advisories?name=MDVSA-2013:072

Trust: 0.8

title:Correct behaviour for TCP queries to allowed address via banned interface. v2.66test12url:http://www.thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=22ce550e5346947a12a781ed0959a7b1165d0dc6

Trust: 0.8

title:dnsmasq-2.66test2url:http://123.124.177.30/web/xxk/bdxqById.tag?id=45660

Trust: 0.6

sources: JVNDB: JVNDB-2013-001751 // CNNVD: CNNVD-201301-396

EXTERNAL IDS

db:NVDid:CVE-2013-0198

Trust: 2.9

db:OPENWALLid:OSS-SECURITY/2013/01/18/7

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2013/01/18/2

Trust: 1.6

db:JVNDBid:JVNDB-2013-001751

Trust: 0.8

db:CNNVDid:CNNVD-201301-396

Trust: 0.6

db:BIDid:57458

Trust: 0.3

db:PACKETSTORMid:121148

Trust: 0.1

db:PACKETSTORMid:127218

Trust: 0.1

sources: BID: 57458 // JVNDB: JVNDB-2013-001751 // PACKETSTORM: 121148 // PACKETSTORM: 127218 // CNNVD: CNNVD-201301-396 // NVD: CVE-2013-0198

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=894486

Trust: 1.9

url:http://www.openwall.com/lists/oss-security/2013/01/18/2

Trust: 1.6

url:http://www.mandriva.com/security/advisories?name=mdvsa-2013:072

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2013/01/18/7

Trust: 1.6

url:http://www.thekelleys.org.uk/gitweb/?p=dnsmasq.git%3ba=commitdiff%3bh=22ce550e5346947a12a781ed0959a7b1165d0dc6

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0198

Trust: 0.9

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0198

Trust: 0.8

url:http://www.thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commitdiff;h=22ce550e5346947a12a781ed0959a7b1165d0dc6

Trust: 0.6

url:http://www.thekelleys.org.uk/dnsmasq/doc.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-0198

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-3411

Trust: 0.2

url:http://www.mandriva.com/en/support/security/

Trust: 0.1

url:https://wiki.mageia.org/en/support/advisories/mgasa-2013-0030

Trust: 0.1

url:http://www.mandriva.com/en/support/security/advisories/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3411

Trust: 0.1

url:https://wiki.mageia.org/en/support/advisories/mgasa-2012-0273

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3411

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0198

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201406-24.xml

Trust: 0.1

sources: BID: 57458 // JVNDB: JVNDB-2013-001751 // PACKETSTORM: 121148 // PACKETSTORM: 127218 // CNNVD: CNNVD-201301-396 // NVD: CVE-2013-0198

CREDITS

Josh Stone

Trust: 0.9

sources: BID: 57458 // CNNVD: CNNVD-201301-396

SOURCES

db:BIDid:57458
db:JVNDBid:JVNDB-2013-001751
db:PACKETSTORMid:121148
db:PACKETSTORMid:127218
db:CNNVDid:CNNVD-201301-396
db:NVDid:CVE-2013-0198

LAST UPDATE DATE

2024-11-23T20:14:04.603000+00:00


SOURCES UPDATE DATE

db:BIDid:57458date:2015-04-13T20:39:00
db:JVNDBid:JVNDB-2013-001751date:2013-12-19T00:00:00
db:CNNVDid:CNNVD-201301-396date:2023-04-19T00:00:00
db:NVDid:CVE-2013-0198date:2024-11-21T01:47:02.777

SOURCES RELEASE DATE

db:BIDid:57458date:2013-01-11T00:00:00
db:JVNDBid:JVNDB-2013-001751date:2013-03-07T00:00:00
db:PACKETSTORMid:121148date:2013-04-08T21:29:19
db:PACKETSTORMid:127218date:2014-06-25T22:49:52
db:CNNVDid:CNNVD-201301-396date:2013-01-22T00:00:00
db:NVDid:CVE-2013-0198date:2013-03-05T21:38:54.827