Computer Security
[EN] securityvulns.ru no-pyccku


dnsmasq TFTP server multiple security vulnerabilities
Published:10.09.2009
Source:
SecurityVulns ID:10222
Type:remote
Threat Level:
5/10
Description:Heap buffer overrun, NULL pointer dereference.
Affected:DNSMASQ : dnsmasq 2.49
CVE:CVE-2009-2958 (The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.)
 CVE-2009-2957 (Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.)
Original documentdocumentCORE SECURITY TECHNOLOGIES ADVISORIES, CORE-2009-0820 - Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server (10.09.2009)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod