dnsmasq: heap overflow, NULL pointer dereference
| Package(s): | dnsmasq | CVE #(s): | CVE-2009-2957 CVE-2009-2958 | ||||||||||||||||||||||||||||||||
| Created: | September 1, 2009 | Updated: | October 14, 2009 | ||||||||||||||||||||||||||||||||
| Description: | From the Red Hat advisory:
Core Security Technologies discovered a heap overflow flaw in dnsmasq when the TFTP service is enabled (the "--enable-tftp" command line option, or by enabling "enable-tftp" in "/etc/dnsmasq.conf"). If the configured tftp-root is sufficiently long, and a remote user sends a request that sends a long file name, dnsmasq could crash or, possibly, execute arbitrary code with the privileges of the dnsmasq service (usually the unprivileged "nobody" user). (CVE-2009-2957) A NULL pointer dereference flaw was discovered in dnsmasq when the TFTP service is enabled. This flaw could allow a malicious TFTP client to crash the dnsmasq service. (CVE-2009-2958) | ||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||
