Page 6 of 32 results (0.008 seconds)

CVSS: 6.8EPSS: 26%CPEs: 76EXPL: 1

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request. Desbordamiento de búfer basado en memoria dinámica en la función tftp_request en tftp.c en dnsmasq anterior v2.50, cuando --enable-tftp es usado, puede permitir a atacantes remotos ejecutar código a su elección a través de un nombre de fichero largo en un paquete TFTP, como queda demostrado en una lectura de respuesta (RRQ). • https://www.exploit-db.com/exploits/9617 http://secunia.com/advisories/36563 http://www.coresecurity.com/content/dnsmasq-vulnerabilities http://www.redhat.com/support/errata/RHSA-2009-1238.html http://www.securityfocus.com/bid/36121 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.ubuntu.com/usn/USN-827-1 https://bugzilla.redhat.com/show_bug.cgi?id=519020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10538 https://rhn.redhat.c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 3%CPEs: 76EXPL: 1

The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option. La función tftp_request en tftp.c en dnsmasq en versiones anteriores a la 2.50, cuando se usa --enable-tftp, permite a atacantes remotos provocar una denegación de servicio (referencia a un puntero nulo y caída del demonio) mediante una petición de lectura TFTP (alias RRQ) con una opción blksize malformada. • https://www.exploit-db.com/exploits/9617 http://secunia.com/advisories/36563 http://www.coresecurity.com/content/dnsmasq-vulnerabilities http://www.redhat.com/support/errata/RHSA-2009-1238.html http://www.securityfocus.com/bid/36120 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.ubuntu.com/usn/USN-827-1 https://bugzilla.redhat.com/show_bug.cgi?id=519020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9816 https://rhn.redhat.co • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

dnsmasq 2.43 allows remote attackers to cause a denial of service (daemon crash) by (1) sending a DHCPINFORM while lacking a DHCP lease, or (2) attempting to renew a nonexistent DHCP lease for an invalid subnet as an "unknown client," a different vulnerability than CVE-2008-3214. dnsmasq 2.43 permite a atacantes remotos provocar una denegación de servicio (caída de monio) mediante (1) el envío de un DHCPINFORM en ausencia de una asignación DHCP o (2) intentando renovar una asignación DHCP no existente para una subred inválida como "cliente desconocido". Vulnerabilidad distinta de CVE-2008-3214. • http://article.gmane.org/gmane.network.dns.dnsmasq.general/2189 http://secunia.com/advisories/31197 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.vupen.com/english/advisories/2008/2166 https://exchange.xforce.ibmcloud.com/vulnerabilities/43957 https://exchange.xforce.ibmcloud.com/vulnerabilities/43960 •

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 2

dnsmasq 2.25 allows remote attackers to cause a denial of service (daemon crash) by (1) renewing a nonexistent lease or (2) sending a DHCPREQUEST for an IP address that is not in the same network, related to the DHCP NAK response from the daemon. dnsmasq versión 2.25, permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) al (1) renovar una concesión inexistente o (2) enviar un DHCPREQUEST para una dirección IP que no está en la misma red, relacionada con la respuesta NAK DHCP del demonio. • http://freshmeat.net/projects/dnsmasq/?branch_id=1991&release_id=217681 http://www.openwall.com/lists/oss-security/2008/06/30/7 http://www.openwall.com/lists/oss-security/2008/07/01/8 http://www.openwall.com/lists/oss-security/2008/07/02/4 http://www.openwall.com/lists/oss-security/2008/07/03/4 http://www.openwall.com/lists/oss-security/2008/07/08/8 http://www.openwall.com/lists/oss-security/2008/07/12/3 http://www.thekelleys.org.uk/dnsmasq • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Dnsmasq 2.29 allows remote attackers to cause a denial of service (application crash) via a DHCP client broadcast reply request. • http://secunia.com/advisories/19760 http://thekelleys.org.uk/dnsmasq/CHANGELOG http://www.osvdb.org/24884 http://www.securityfocus.com/bid/17662 http://www.vupen.com/english/advisories/2006/1494 https://exchange.xforce.ibmcloud.com/vulnerabilities/26005 •