GLSA-200909-19 : Dnsmasq: Multiple vulnerabilities

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200909-19
(Dnsmasq: Multiple vulnerabilities)

Multiple vulnerabilities have been reported in the TFTP functionality
included in Dnsmasq:
Pablo Jorge and Alberto Solino
discovered a heap-based buffer overflow (CVE-2009-2957).
anonymous researcher reported a NULL pointer reference

Impact :

A remote attacker in the local network could exploit these
vulnerabilities by sending specially crafted TFTP requests to a machine
running Dnsmasq, possibly resulting in the remote execution of
arbitrary code with the privileges of the user running the daemon, or a
Denial of Service. NOTE: The TFTP server is not enabled by default.

Workaround :

You can disable the TFTP server either at buildtime by not enabling the
'tftp' USE flag, or at runtime. Make sure '--enable-tftp' is not set in
the DNSMASQ_OPTS variable in the /etc/conf.d/dnsmasq file and
'enable-tftp' is not set in /etc/dnsmasq.conf, either of which would
enable TFTP support if it is compiled in.

See also :

Solution :

All Dnsmasq users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dns/dnsmasq-2.5.0'

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 41023 (gentoo_GLSA-200909-19.nasl)

Bugtraq ID: 36120

CVE ID: CVE-2009-2957

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now