Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2957

Опубликовано: 02 сент. 2009
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 6.8

Описание

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

РелизСтатусПримечание
dapper

not-affected

devel

released

2.50-1
hardy

released

2.41-2ubuntu2.2
intrepid

released

2.45-1ubuntu1.1
jaunty

released

2.47-3ubuntu0.1
upstream

released

2.50-1

Показывать по

EPSS

Процентиль: 89%
0.04588
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

nvd
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

debian
почти 16 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in d ...

github
около 3 лет назад

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

fstec
почти 16 лет назад

Уязвимость программного обеспечения Dnsmasq, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 89%
0.04588
Низкий

6.8 Medium

CVSS2