Page 6 of 29 results (0.007 seconds)

CVSS: 6.8EPSS: 26%CPEs: 76EXPL: 1

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request. Desbordamiento de búfer basado en memoria dinámica en la función tftp_request en tftp.c en dnsmasq anterior v2.50, cuando --enable-tftp es usado, puede permitir a atacantes remotos ejecutar código a su elección a través de un nombre de fichero largo en un paquete TFTP, como queda demostrado en una lectura de respuesta (RRQ). • https://www.exploit-db.com/exploits/9617 http://secunia.com/advisories/36563 http://www.coresecurity.com/content/dnsmasq-vulnerabilities http://www.redhat.com/support/errata/RHSA-2009-1238.html http://www.securityfocus.com/bid/36121 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.ubuntu.com/usn/USN-827-1 https://bugzilla.redhat.com/show_bug.cgi?id=519020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10538 https://rhn.redhat.c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 3%CPEs: 76EXPL: 1

The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option. La función tftp_request en tftp.c en dnsmasq en versiones anteriores a la 2.50, cuando se usa --enable-tftp, permite a atacantes remotos provocar una denegación de servicio (referencia a un puntero nulo y caída del demonio) mediante una petición de lectura TFTP (alias RRQ) con una opción blksize malformada. • https://www.exploit-db.com/exploits/9617 http://secunia.com/advisories/36563 http://www.coresecurity.com/content/dnsmasq-vulnerabilities http://www.redhat.com/support/errata/RHSA-2009-1238.html http://www.securityfocus.com/bid/36120 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.ubuntu.com/usn/USN-827-1 https://bugzilla.redhat.com/show_bug.cgi?id=519020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9816 https://rhn.redhat.co • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

Off-by-one buffer overflow in Dnsmasq before 2.21 may allow attackers to execute arbitrary code via the DHCP lease file. • http://secunia.com/advisories/14691 http://www.securityfocus.com/bid/12897 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG https://exchange.xforce.ibmcloud.com/vulnerabilities/19825 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Dnsmasq before 2.21 allows remote attackers to poison the DNS cache via answers to queries that were not made by Dnsmasq. • http://secunia.com/advisories/14691 http://www.securityfocus.com/bid/12897 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG https://exchange.xforce.ibmcloud.com/vulnerabilities/19826 • CWE-346: Origin Validation Error •