FreeBSD : dnsmasq -- TFTP server remote code injection vulnerability (80aa98e0-97b4-11de-b946-0030843d3802)

Medium Nessus Plugin ID 40858


The remote FreeBSD host is missing a security-related update.


Simon Kelley reports :

Fix security problem which allowed any host permitted to do TFTP to possibly compromise dnsmasq by remote buffer overflow when TFTP enabled.

Fix a problem which allowed a malicious TFTP client to crash dnsmasq.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 40858

File Name: freebsd_pkg_80aa98e097b411deb9460030843d3802.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2009/09/03

Modified: 2016/12/08

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:dnsmasq, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/09/02

Vulnerability Publication Date: 2009/08/31

Reference Information

CVE: CVE-2009-2957, CVE-2009-2958

BID: 36120, 36121

CWE: 119, 399