Executive Summary

Informations
Name CVE-2009-2958 First vendor Publication 2009-09-02
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2958

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13718
 
Oval ID: oval:org.mitre.oval:def:13718
Title: DSA-1876-1 dnsmasq -- buffer overflow
Description: Several remote vulnerabilities have been discovered in the TFTP component of dnsmasq. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-2957 A buffer overflow in TFTP processing may enable arbitrary code execution to attackers which are permitted to use the TFTP service. CVE-2009-2958 Malicious TFTP clients may crash dnsmasq, leading to denial of service. The old stable distribution is not affected by these problems. For the stable distribution, these problems have been fixed in version 2.45-1+lenny1. For the unstable distribution, these problems have been fixed in version 2.50-1. We recommend that you upgrade your dnsmasq packages.
Family: unix Class: patch
Reference(s): DSA-1876-1
CVE-2009-2957
CVE-2009-2958
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): dnsmasq
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13921
 
Oval ID: oval:org.mitre.oval:def:13921
Title: USN-827-1 -- dnsmasq vulnerabilities
Description: IvAin Arce, Pablo HernAin Jorge, Alejandro Pablo Rodriguez, MartA­n Coco, Alberto SoliAto Testa and Pablo Annetta discovered that Dnsmasq did not properly validate its input when processing TFTP requests for files with long names. A remote attacker could cause a denial of service or execute arbitrary code with user privileges. Dnsmasq runs as the "dnsmasq" user by default on Ubuntu. Steve Grubb discovered that Dnsmasq could be made to dereference a NULL pointer when processing certain TFTP requests. A remote attacker could cause a denial of service by sending a crafted TFTP request
Family: unix Class: patch
Reference(s): USN-827-1
CVE-2009-2957
CVE-2009-2958
Version: 5
Platform(s): Ubuntu 8.10
Ubuntu 8.04
Ubuntu 9.04
Product(s): dnsmasq
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22599
 
Oval ID: oval:org.mitre.oval:def:22599
Title: ELSA-2009:1238: dnsmasq security update (Important)
Description: The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
Family: unix Class: patch
Reference(s): ELSA-2009:1238-01
CVE-2009-2957
CVE-2009-2958
Version: 13
Platform(s): Oracle Linux 5
Product(s): dnsmasq
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29359
 
Oval ID: oval:org.mitre.oval:def:29359
Title: RHSA-2009:1238 -- dnsmasq security update (Important)
Description: An updated dnsmasq package that fixes two security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. Dnsmasq is a lightweight and easy to configure DNS forwarder and DHCP server.
Family: unix Class: patch
Reference(s): RHSA-2009:1238
CESA-2009:1238-CentOS 5
CVE-2009-2957
CVE-2009-2958
Version: 3
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): dnsmasq
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7920
 
Oval ID: oval:org.mitre.oval:def:7920
Title: DSA-1876 dnsmasq -- buffer overflow
Description: Several remote vulnerabilities have been discovered in the TFTP component of dnsmasq. The Common Vulnerabilities and Exposures project identifies the following problems: A buffer overflow in TFTP processing may enable arbitrary code execution to attackers which are permitted to use the TFTP service. Malicious TFTP clients may crash dnsmasq, leading to denial of service. The old stable distribution is not affected by these problems.
Family: unix Class: patch
Reference(s): DSA-1876
CVE-2009-2957
CVE-2009-2958
Version: 3
Platform(s): Debian GNU/Linux 5.0
Product(s): dnsmasq
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9816
 
Oval ID: oval:org.mitre.oval:def:9816
Title: The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
Description: The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2958
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 77

ExploitDB Exploits

id Description
2009-09-09 Dnsmasq < 2.50 - Heap Overflow & Null pointer Dereference Vulns

OpenVAS Exploits

Date Description
2011-08-09 Name : CentOS Update for dnsmasq CESA-2009:1238 centos5 i386
File : nvt/gb_CESA-2009_1238_dnsmasq_centos5_i386.nasl
2011-08-09 Name : CentOS Update for gnutls CESA-2009:123 centos5 i386
File : nvt/gb_CESA-2009_123_gnutls_centos5_i386.nasl
2009-10-19 Name : Fedora Core 10 FEDORA-2009-10252 (dnsmasq)
File : nvt/fcore_2009_10252.nasl
2009-10-19 Name : Fedora Core 11 FEDORA-2009-10285 (dnsmasq)
File : nvt/fcore_2009_10285.nasl
2009-09-21 Name : Gentoo Security Advisory GLSA 200909-19 (dnsmasq)
File : nvt/glsa_200909_19.nasl
2009-09-09 Name : Debian Security Advisory DSA 1876-1 (dnsmasq)
File : nvt/deb_1876_1.nasl
2009-09-09 Name : FreeBSD Ports: dnsmasq
File : nvt/freebsd_dnsmasq.nasl
2009-09-09 Name : CentOS Security Advisory CESA-2009:1238 (dnsmasq)
File : nvt/ovcesa2009_1238.nasl
2009-09-09 Name : SuSE Security Summary SUSE-SR:2009:014
File : nvt/suse_sr_2009_014.nasl
2009-09-09 Name : Ubuntu USN-827-1 (dnsmasq)
File : nvt/ubuntu_827_1.nasl
2009-09-02 Name : RedHat Security Advisory RHSA-2009:1238
File : nvt/RHSA_2009_1238.nasl
2009-09-02 Name : Dnsmasq TFTP Service multiple vulnerabilities
File : nvt/dnsmasq_tftp.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
57593 Dnsmasq src/ftpd.c tftp_request() Function NULL Dereference Remote DoS

Snort® IPS/IDS

Date Description
2014-01-10 PUT filename overflow attempt
RuleID : 2337-community - Revision : 23 - Type : PROTOCOL-TFTP
2014-01-10 PUT filename overflow attempt
RuleID : 2337 - Revision : 23 - Type : PROTOCOL-TFTP
2014-01-10 GET filename overflow attempt
RuleID : 1941-community - Revision : 24 - Type : PROTOCOL-TFTP
2014-01-10 GET filename overflow attempt
RuleID : 1941 - Revision : 24 - Type : PROTOCOL-TFTP

Nessus® Vulnerability Scanner

Date Description
2014-11-26 Name : The remote OracleVM host is missing a security update.
File : oraclevm_OVMSA-2009-0022.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2009-1238.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing a security update.
File : sl_20090831_dnsmasq_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1876.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2009-1238.nasl - Type : ACT_GATHER_INFO
2009-10-15 Name : The remote Fedora host is missing a security update.
File : fedora_2009-10252.nasl - Type : ACT_GATHER_INFO
2009-10-15 Name : The remote Fedora host is missing a security update.
File : fedora_2009-10285.nasl - Type : ACT_GATHER_INFO
2009-09-21 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200909-19.nasl - Type : ACT_GATHER_INFO
2009-09-04 Name : The remote TFTP service is affected by multiple vulnerabilities.
File : dnsmasq_multiple_tftp_flaws.nasl - Type : ACT_GATHER_INFO
2009-09-03 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_80aa98e097b411deb9460030843d3802.nasl - Type : ACT_GATHER_INFO
2009-09-02 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2009-1238.nasl - Type : ACT_GATHER_INFO
2009-09-02 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-827-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/36563
http://www.coresecurity.com/content/dnsmasq-vulnerabilities
http://www.redhat.com/support/errata/RHSA-2009-1238.html
http://www.securityfocus.com/bid/36120
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
http://www.ubuntu.com/usn/USN-827-1
https://bugzilla.redhat.com/show_bug.cgi?id=519020
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://rhn.redhat.com/errata/RHSA-2010-0095.html
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Date Informations
2024-11-28 23:10:29
  • Multiple Updates
2024-11-28 12:19:40
  • Multiple Updates
2022-09-07 01:08:38
  • Multiple Updates
2021-05-05 01:06:10
  • Multiple Updates
2021-05-04 12:10:00
  • Multiple Updates
2021-04-22 01:10:23
  • Multiple Updates
2020-05-24 01:05:55
  • Multiple Updates
2020-05-23 01:40:47
  • Multiple Updates
2020-05-23 00:24:13
  • Multiple Updates
2017-09-19 09:23:22
  • Multiple Updates
2016-04-26 19:03:57
  • Multiple Updates
2014-11-27 13:27:35
  • Multiple Updates
2014-02-17 10:51:22
  • Multiple Updates
2014-01-19 21:26:07
  • Multiple Updates
2013-05-10 23:56:10
  • Multiple Updates
2013-01-23 13:21:54
  • Multiple Updates