CVE-2020-14312

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-14312
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-14312.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-14312
Downstream
Related
Published
2021-02-06T00:15:12Z
Modified
2025-08-09T19:01:27Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option local-service is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.

References

Affected packages