MiracleLinux 4 : dnsmasq-2.48-13.AXS4 (AXSA:2013-132:01)

high Nessus Plugin ID 291472

Synopsis

The remote MiracleLinux host is missing a security update.

Description

The remote MiracleLinux 4 host has a package installed that is affected by a vulnerability as referenced in the AXSA:2013-132:01 advisory.

Dnsmasq is lightweight, easy to configure DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network. It can serve the names of local machines which are not in the global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP-allocated addresses to appear in the DNS with names configured either in each host or in a central configuration file. Dnsmasq supports static and dynamic DHCP leases and BOOTP for network booting of diskless machines.
Security issues fixed with this release:
CVE-2012-3411 Dnsmasq before 2.63test1, when used with certain libvirt configurations, replies to requests from prohibited interfaces, which allows remote attackers to cause a denial of service (traffic amplification) via a spoofed DNS query.
Fixed bug:
Previously, the dhcp-script option in the /etc/dnsmasq.conf configuration file did not work. The regression that disabled the lease change script has been fixed.
Enhancements:
Because dnsmasq did not validate that the provided root tftp directory actually existed and was a directory, configuration errors were not immediately reported on startup. This has been fixed, making fault-finding easier when dnsmasq is called by other processes.
The dnsmasq init script used an incorrect Process Identifier (PID) in the stop, restart, and condrestart commands. This led to many problems, such as repeated calling of service dnsmasq with stop or restart killing all running dnsmasq instances.
If two or more dnsmasq processes were running with DHCP enabled on one interface, DHCP RELEASE packets could become lost. This has been fixed.

Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected dnsmasq package.

See Also

https://tsn.miraclelinux.com/en/node/3760

Plugin Details

Severity: High

ID: 291472

File Name: miracle_linux_AXSA-2013-132.nasl

Version: 1.1

Type: local

Published: 1/19/2026

Updated: 1/19/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: High

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2012-3411

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:miracle:linux:dnsmasq, cpe:/o:miracle:linux:4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/8/2013

Vulnerability Publication Date: 7/9/2012

Reference Information

CVE: CVE-2012-3411