Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-2957

Опубликовано: 31 авг. 2009
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=519020dnsmasq: multiple vulnerabilities in TFTP server

EPSS

Процентиль: 89%
0.04588
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

nvd
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

debian
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in d ...

github
около 3 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

fstec
почти 16 лет назад

Уязвимость программного обеспечения Dnsmasq, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 89%
0.04588
Низкий

6.8 Medium

CVSS2