FreeBSD : dnsmasq -- TFTP server remote code injection vulnerability (80aa98e0-97b4-11de-b946-0030843d3802)

medium Nessus Plugin ID 40858

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Simon Kelley reports :

Fix security problem which allowed any host permitted to do TFTP to possibly compromise dnsmasq by remote buffer overflow when TFTP enabled.

Fix a problem which allowed a malicious TFTP client to crash dnsmasq.

Solution

Update the affected package.

See Also

https://www.secureauth.com/labs/advisories/dnsmasq-vulnerabilities

https://access.redhat.com/errata/RHSA-2009:1238

http://www.nessus.org/u?aec1e001

Plugin Details

Severity: Medium

ID: 40858

File Name: freebsd_pkg_80aa98e097b411deb9460030843d3802.nasl

Version: 1.15

Type: local

Published: 9/3/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:dnsmasq, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 9/2/2009

Vulnerability Publication Date: 8/31/2009

Reference Information

CVE: CVE-2009-2957, CVE-2009-2958

BID: 36120, 36121

CWE: 119, 399