![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2009-2957 |
Description: | Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.880761 1.3.6.1.4.1.25623.1.0.64829 1.3.6.1.4.1.25623.1.0.122452 1.3.6.1.4.1.25623.1.0.64819 1.3.6.1.4.1.25623.1.0.64673 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2957 BugTraq ID: 36121 http://www.securityfocus.com/bid/36121 http://www.coresecurity.com/content/dnsmasq-vulnerabilities https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10538 RedHat Security Advisories: RHSA-2009:1238 http://www.redhat.com/support/errata/RHSA-2009-1238.html RedHat Security Advisories: RHSA-2010:0095 https://rhn.redhat.com/errata/RHSA-2010-0095.html http://secunia.com/advisories/36563 http://www.ubuntu.com/usn/USN-827-1 |