Executive Summary

Informations
Name CVE-2009-2957 First vendor Publication 2009-09-02
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2957

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10538
 
Oval ID: oval:org.mitre.oval:def:10538
Title: Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
Description: Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2957
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 77

ExploitDB Exploits

id Description
2009-09-09 Dnsmasq < 2.50 - Heap Overflow & Null pointer Dereference Vulns

OpenVAS Exploits

Date Description
2011-08-09 Name : CentOS Update for dnsmasq CESA-2009:1238 centos5 i386
File : nvt/gb_CESA-2009_1238_dnsmasq_centos5_i386.nasl
2011-08-09 Name : CentOS Update for gnutls CESA-2009:123 centos5 i386
File : nvt/gb_CESA-2009_123_gnutls_centos5_i386.nasl
2009-10-19 Name : Fedora Core 10 FEDORA-2009-10252 (dnsmasq)
File : nvt/fcore_2009_10252.nasl
2009-10-19 Name : Fedora Core 11 FEDORA-2009-10285 (dnsmasq)
File : nvt/fcore_2009_10285.nasl
2009-09-21 Name : Gentoo Security Advisory GLSA 200909-19 (dnsmasq)
File : nvt/glsa_200909_19.nasl
2009-09-09 Name : Debian Security Advisory DSA 1876-1 (dnsmasq)
File : nvt/deb_1876_1.nasl
2009-09-09 Name : FreeBSD Ports: dnsmasq
File : nvt/freebsd_dnsmasq.nasl
2009-09-09 Name : CentOS Security Advisory CESA-2009:1238 (dnsmasq)
File : nvt/ovcesa2009_1238.nasl
2009-09-09 Name : SuSE Security Summary SUSE-SR:2009:014
File : nvt/suse_sr_2009_014.nasl
2009-09-09 Name : Ubuntu USN-827-1 (dnsmasq)
File : nvt/ubuntu_827_1.nasl
2009-09-02 Name : RedHat Security Advisory RHSA-2009:1238
File : nvt/RHSA_2009_1238.nasl
2009-09-02 Name : Dnsmasq TFTP Service multiple vulnerabilities
File : nvt/dnsmasq_tftp.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
57592 Dnsmasq src/tftp.c tftp_request() Function Remote Overflow

Snort® IPS/IDS

Date Description
2014-01-10 PUT filename overflow attempt
RuleID : 2337-community - Revision : 23 - Type : PROTOCOL-TFTP
2014-01-10 PUT filename overflow attempt
RuleID : 2337 - Revision : 23 - Type : PROTOCOL-TFTP
2014-01-10 GET filename overflow attempt
RuleID : 1941-community - Revision : 24 - Type : PROTOCOL-TFTP
2014-01-10 GET filename overflow attempt
RuleID : 1941 - Revision : 24 - Type : PROTOCOL-TFTP

Nessus® Vulnerability Scanner

Date Description
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2009-0022.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2009-1238.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20090831_dnsmasq_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1876.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2009-1238.nasl - Type : ACT_GATHER_INFO
2009-10-15 Name : The remote Fedora host is missing a security update.
File : fedora_2009-10252.nasl - Type : ACT_GATHER_INFO
2009-10-15 Name : The remote Fedora host is missing a security update.
File : fedora_2009-10285.nasl - Type : ACT_GATHER_INFO
2009-09-21 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200909-19.nasl - Type : ACT_GATHER_INFO
2009-09-04 Name : The remote TFTP service is affected by multiple vulnerabilities.
File : dnsmasq_multiple_tftp_flaws.nasl - Type : ACT_GATHER_INFO
2009-09-03 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_80aa98e097b411deb9460030843d3802.nasl - Type : ACT_GATHER_INFO
2009-09-02 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2009-1238.nasl - Type : ACT_GATHER_INFO
2009-09-02 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-827-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/36563
http://www.coresecurity.com/content/dnsmasq-vulnerabilities
http://www.redhat.com/support/errata/RHSA-2009-1238.html
http://www.securityfocus.com/bid/36121
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
http://www.ubuntu.com/usn/USN-827-1
https://bugzilla.redhat.com/show_bug.cgi?id=519020
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Date Informations
2024-11-28 23:10:29
  • Multiple Updates
2024-11-28 12:19:40
  • Multiple Updates
2022-09-07 01:08:38
  • Multiple Updates
2021-05-05 01:06:10
  • Multiple Updates
2021-05-04 12:10:00
  • Multiple Updates
2021-04-22 01:10:23
  • Multiple Updates
2020-05-24 01:05:55
  • Multiple Updates
2020-05-23 01:40:47
  • Multiple Updates
2020-05-23 00:24:13
  • Multiple Updates
2017-09-19 09:23:22
  • Multiple Updates
2016-04-26 19:03:56
  • Multiple Updates
2014-11-27 13:27:35
  • Multiple Updates
2014-02-17 10:51:22
  • Multiple Updates
2014-01-19 21:26:07
  • Multiple Updates
2013-05-10 23:56:08
  • Multiple Updates
2013-01-23 13:21:54
  • Multiple Updates