CVE-2009-2957
Published Sep 2, 2009
Last updated 7 years ago
Overview
- Description
- Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C214CD9-059C-4211-A20F-A9C32D96EE5D", "versionEndIncluding": "2.49" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C940D03A-EAAB-4A9F-BAD9-F5B3A8B626F0" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF93550-7A3C-4F8F-B242-EBA90F8DA820" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB34D798-1CE9-478E-ABF6-502AEB5153BE" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83842D26-CD1A-4880-BFB2-A29C681DEF54" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.95:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "37F2C4F7-183F-43A6-AB7E-D7A11E8FA6F5" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.96:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5BB5AEA-8B22-4F2A-A7B2-B974475C92D7" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.98:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94C97061-04B7-42F9-8C82-B405C3AD0614" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.992:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1936D4A9-A8DF-4DCE-94CA-027C40E86E62" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:0.996:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E8954FA-4913-47A1-8FAD-A2D1E9CAF8D8" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E34FF38A-8B3B-4299-911D-FBB0DC6AC700" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DFBABB9-056D-45EB-87F6-47A25C5A0297" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2263A232-EAA9-49DC-B91F-2F73C45AA68B" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "869D7B02-6EA7-4A7D-B6CA-93BD2E057784" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D90FB55-73CB-4F99-92C6-99AD49872CEA" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CE1A634-20CF-43A0-9441-E249C09D1938" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE397BC5-E523-4048-8B75-A332B618C64D" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC86CFA8-7019-481D-B6ED-F4152DA64C85" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48EFFFBE-15EB-4A17-A285-A7299D771391" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CAF4136-4587-4C1D-B303-518820A6E17A" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CD4F393-64A2-42AD-8CBA-80F9FBC3307A" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17C26CD9-9357-4275-A46B-D63A5C20EDE1" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5CC931A-3B4D-4E0C-AB80-DCBB18260079" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E80EE61-3271-4BB6-BCBD-F85492B2B865" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07B539B5-ACCD-4BDC-962E-7E9FCE33D263" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1537C31B-FB1A-40AC-8FFF-033B3CBD236B" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86965249-76A4-4963-AD92-CE244E1EC6F5" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:1.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE2B2312-A4F9-422E-89EC-687D26500B39" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "955C42CA-93C0-41B5-9687-1F8476BA9846" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D463C1BC-35A9-4AD7-8908-BBB293CE2FE8" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A3F0716-7898-40AC-8E25-B93CA64A04E6" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6FB1BA4-C1F9-44F4-8048-33CC26AD1C95" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6730AA2-C4EE-4FE6-BA20-CBC58EDD16B1" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61593637-2CD7-48A1-A31C-E5DE62424B26" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52309F28-53FD-438C-9913-7228B8387DE5" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B252C33B-0144-4737-B34E-761B227F9EF8" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2C6DA43-93AC-462B-81E7-6A6819AF8988" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BFBF5E9-7287-4B1D-AD78-0E30A5E2F0E9" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58DB4CAB-2ED9-473A-8B36-FA4F941A8281" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "644F05EE-9019-4BD8-9F2C-5DEF2E8FE486" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07A3613F-A4FC-4643-A155-27A6BAB890C0" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F74BAF2-F875-4394-9447-9201520E65A2" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96141817-BC07-4643-8E57-63445E65F720" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C391DF4E-9FA3-44FE-AF61-52461EC209C0" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F06E581B-2A84-4145-91DC-2B9D4ADC227B" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAC75365-A06A-4EF2-A54D-2595B480C9DE" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34412174-A7A5-4D8A-8D04-BB187594852B" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BC0DDCD-5AE5-4F4C-9C17-97803CCB8810" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14FAD4A7-FB21-4B37-9403-09D2CCF68888" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7A05414-B0DC-4D7B-B542-ACF407822EE8" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5C8F897-1A9F-4D25-A42B-8F31DD14E2C3" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5505D0A5-9D21-4563-81AA-7CAB3D369514" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCC53D53-4652-40D4-8F9A-D704BCEABDA4" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ADECE43-F034-43E5-AA84-3EB336877DEC" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78F10EE3-93C4-4FF5-874D-BEDD9E3F3A93" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.27:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0603A8CB-3096-4A68-8B9E-4512A9E8D210" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.28:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C29425C5-EBDF-4092-8A47-9D0A00122B5C" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.29:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36FDAB2B-740B-4AA8-AF48-DB7FA69E5F9B" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DED55642-B6EA-437E-9DA3-23A77C3D2131" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65412752-9C17-4DAC-A623-FA6AAF36A303" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB334E27-499F-4C42-BDA7-3E62EE7CE562" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBE126DF-AF32-4146-82D0-64D7423155DC" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.35:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B6ACF5F-43D6-442E-9846-CCCF37DB4F5A" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8995A4B1-C576-443B-BA96-6FC39E63A7BA" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.37:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E1AF984-B7BA-4F1A-BDA2-DBF66E3FB320" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.38:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F34176B-9712-4F36-8C4F-B2FAD72B4441" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.39:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F978EB99-7E43-4E2D-92B5-F09AFBB80949" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.40:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A15AC9BA-102F-401B-A7C7-D2B1AF81F795" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1DE877B-54A3-4631-ABA8-29BAB4D3DD6D" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.42:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BE68B29-59F7-443A-A185-A11DE153D969" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00A857D2-A159-4577-AF8B-51742256DC59" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.44:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09679031-5CDD-46DC-9FD9-7C3459775D55" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9DE3027-9521-491F-B982-402D191214EA" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.46:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AF13585-74CE-4B62-BB29-8F7E5FABB66B" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.47:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C2ECBD5-AF65-402E-80FE-BAF1144B3C29" }, { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.48:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "558DDC2F-DAF6-42BE-B36A-D998EBADBC95" } ], "operator": "OR" } ] } ]