Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

dnsmasq: Incomplete fix for the CVE-2012-3411 issue

$
0
0

The CVE-2012-3411 identifier has been originally assigned to the
following issue:

When dnsmasq is used in conjunctions with certain configurations of libvirtd, network packets from prohibited networks (e.g. packets that should not be passed in) may be sent to the dnsmasq application
and processed. This can result in DNS amplification attacks for example.
[1] http://www.openwall.com/lists/oss-security/2012/07/12/5

Later it was found:
[2] https://bugzilla.redhat.com/show_bug.cgi?id=894486
[3] https://bugzilla.redhat.com/show_bug.cgi?id=894486#c3

the upstream patch for CVE-2012-3411 it not to be working properly,
as it still allowed (from [3]):

* replies to remote TCP-protocol based DNS queries
(UDP protocol ones were corrected, but TCP ones not)
from prohibited networks, when the --bind-dynamic option was used,

* when --except-interface lo option was used dnsmasq didn't
answer local or remote UDP DNS queries, but still allowed
TCP protocol based DNS queries,

* when --except-interface lo option was not used local / remote
TCP DNS queries were also still answered by dnsmasq.

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team





//The information contained within this publication is

//supplied "as-is"with no warranties or guarantees of fitness

//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts

//responsibility for any damage caused by the use or misuse of

//this information



Viewing all articles
Browse latest Browse all 8064

Trending Articles