Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3wv8-c9pw-2c36

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

EPSS

Процентиль: 89%
0.04588
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

redhat
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

nvd
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

debian
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in d ...

fstec
почти 16 лет назад

Уязвимость программного обеспечения Dnsmasq, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 89%
0.04588
Низкий

Дефекты

CWE-119