Логотип exploitDog
bind:CVE-2020-14312
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-14312

Количество 8

Количество 8

ubuntu логотип

CVE-2020-14312

около 5 лет назад

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2020-14312

больше 5 лет назад

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2020-14312

около 5 лет назад

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2020-14312

около 5 лет назад

A flaw was found in the default configuration of dnsmasq, as shipped w ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-xr95-5hhj-crp6

больше 3 лет назад

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:3530-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1426-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:3530-1

больше 4 лет назад

Security update for dnsmasq

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-14312

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 5.9
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-14312

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-14312

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 5.9
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-14312

A flaw was found in the default configuration of dnsmasq, as shipped w ...

CVSS3: 5.9
0%
Низкий
около 5 лет назад
github логотип
GHSA-xr95-5hhj-crp6

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2021:3530-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1426-1

Security update for dnsmasq

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:3530-1

Security update for dnsmasq

больше 4 лет назад

Уязвимостей на страницу