CVE-2009-2957 – Dnsmasq < 2.50 - Heap Overflow / Null Pointer Dereference
https://notcve.org/view.php?id=CVE-2009-2957
Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request. Desbordamiento de búfer basado en memoria dinámica en la función tftp_request en tftp.c en dnsmasq anterior v2.50, cuando --enable-tftp es usado, puede permitir a atacantes remotos ejecutar código a su elección a través de un nombre de fichero largo en un paquete TFTP, como queda demostrado en una lectura de respuesta (RRQ). • https://www.exploit-db.com/exploits/9617 http://secunia.com/advisories/36563 http://www.coresecurity.com/content/dnsmasq-vulnerabilities http://www.redhat.com/support/errata/RHSA-2009-1238.html http://www.securityfocus.com/bid/36121 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.ubuntu.com/usn/USN-827-1 https://bugzilla.redhat.com/show_bug.cgi?id=519020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10538 https://rhn.redhat.c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-2958 – Dnsmasq < 2.50 - Heap Overflow / Null Pointer Dereference
https://notcve.org/view.php?id=CVE-2009-2958
The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option. La función tftp_request en tftp.c en dnsmasq en versiones anteriores a la 2.50, cuando se usa --enable-tftp, permite a atacantes remotos provocar una denegación de servicio (referencia a un puntero nulo y caída del demonio) mediante una petición de lectura TFTP (alias RRQ) con una opción blksize malformada. • https://www.exploit-db.com/exploits/9617 http://secunia.com/advisories/36563 http://www.coresecurity.com/content/dnsmasq-vulnerabilities http://www.redhat.com/support/errata/RHSA-2009-1238.html http://www.securityfocus.com/bid/36120 http://www.thekelleys.org.uk/dnsmasq/CHANGELOG http://www.ubuntu.com/usn/USN-827-1 https://bugzilla.redhat.com/show_bug.cgi?id=519020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9816 https://rhn.redhat.co • CWE-399: Resource Management Errors •
CVE-2008-3214
https://notcve.org/view.php?id=CVE-2008-3214
dnsmasq 2.25 allows remote attackers to cause a denial of service (daemon crash) by (1) renewing a nonexistent lease or (2) sending a DHCPREQUEST for an IP address that is not in the same network, related to the DHCP NAK response from the daemon. dnsmasq versión 2.25, permite a los atacantes remotos causar una denegación de servicio (bloqueo del demonio) al (1) renovar una concesión inexistente o (2) enviar un DHCPREQUEST para una dirección IP que no está en la misma red, relacionada con la respuesta NAK DHCP del demonio. • http://freshmeat.net/projects/dnsmasq/?branch_id=1991&release_id=217681 http://www.openwall.com/lists/oss-security/2008/06/30/7 http://www.openwall.com/lists/oss-security/2008/07/01/8 http://www.openwall.com/lists/oss-security/2008/07/02/4 http://www.openwall.com/lists/oss-security/2008/07/03/4 http://www.openwall.com/lists/oss-security/2008/07/08/8 http://www.openwall.com/lists/oss-security/2008/07/12/3 http://www.thekelleys.org.uk/dnsmasq • CWE-20: Improper Input Validation •