Description
Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1876-1 | New dnsmasq packages fix remote code execution |
EUVD |
EUVD-2009-2944 | Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request. |
Ubuntu USN |
USN-827-1 | Dnsmasq vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:07:37.403Z
Reserved: 2009-08-24T00:00:00.000Z
Link: CVE-2009-2957
No data.
Status : Modified
Published: 2009-09-02T15:30:01.407
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-2957
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN