First published: Mon Aug 31 2009(Updated: )
The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/dnsmasq | <0:2.45-1.1.el5_3 | 0:2.45-1.1.el5_3 |
the kelleys dnsmasq | =0.4 | |
the kelleys dnsmasq | =2.11 | |
the kelleys dnsmasq | =2.28 | |
the kelleys dnsmasq | =2.39 | |
the kelleys dnsmasq | =0.996 | |
the kelleys dnsmasq | =1.8 | |
the kelleys dnsmasq | =2.1 | |
the kelleys dnsmasq | =2.25 | |
the kelleys dnsmasq | =2.6 | |
the kelleys dnsmasq | =1.2 | |
the kelleys dnsmasq | =1.16 | |
the kelleys dnsmasq | =0.98 | |
the kelleys dnsmasq | =2.34 | |
the kelleys dnsmasq | =2.7 | |
the kelleys dnsmasq | =1.6 | |
the kelleys dnsmasq | =2.23 | |
the kelleys dnsmasq | =2.36 | |
the kelleys dnsmasq | =2.41 | |
the kelleys dnsmasq | =0.95 | |
the kelleys dnsmasq | =2.22 | |
the kelleys dnsmasq | =1.15 | |
the kelleys dnsmasq | =2.46 | |
the kelleys dnsmasq | =0.6 | |
the kelleys dnsmasq | =2.9 | |
the kelleys dnsmasq | =1.7 | |
the kelleys dnsmasq | =2.14 | |
the kelleys dnsmasq | =1.14 | |
the kelleys dnsmasq | =1.12 | |
the kelleys dnsmasq | =1.9 | |
the kelleys dnsmasq | =0.992 | |
the kelleys dnsmasq | =2.20 | |
the kelleys dnsmasq | =2.13 | |
the kelleys dnsmasq | =2.4 | |
the kelleys dnsmasq | =2.44 | |
the kelleys dnsmasq | =1.4 | |
the kelleys dnsmasq | =1.3 | |
the kelleys dnsmasq | =2.10 | |
the kelleys dnsmasq | =1.10 | |
the kelleys dnsmasq | =0.7 | |
the kelleys dnsmasq | =2.3 | |
the kelleys dnsmasq | =2.37 | |
the kelleys dnsmasq | =2.43 | |
the kelleys dnsmasq | =2.29 | |
the kelleys dnsmasq | =2.40 | |
the kelleys dnsmasq | =2.35 | |
the kelleys dnsmasq | =2.17 | |
the kelleys dnsmasq | =2.0 | |
the kelleys dnsmasq | =2.19 | |
the kelleys dnsmasq | =2.42 | |
the kelleys dnsmasq | =2.24 | |
the kelleys dnsmasq | =1.11 | |
the kelleys dnsmasq | =1.17 | |
the kelleys dnsmasq | =2.38 | |
the kelleys dnsmasq | =2.16 | |
the kelleys dnsmasq | =2.48 | |
the kelleys dnsmasq | =1.0 | |
the kelleys dnsmasq | =2.27 | |
the kelleys dnsmasq | =2.33 | |
the kelleys dnsmasq | =1.18 | |
the kelleys dnsmasq | =1.5 | |
the kelleys dnsmasq | =1.13 | |
the kelleys dnsmasq | =2.45 | |
the kelleys dnsmasq | =2.5 | |
the kelleys dnsmasq | =2.47 | |
the kelleys dnsmasq | =0.96 | |
the kelleys dnsmasq | =2.30 | |
the kelleys dnsmasq | =2.21 | |
the kelleys dnsmasq | =0.5 | |
the kelleys dnsmasq | =2.8 | |
the kelleys dnsmasq | =2.26 | |
the kelleys dnsmasq | =2.31 | |
the kelleys dnsmasq | =2.2 | |
the kelleys dnsmasq | <=2.49 | |
the kelleys dnsmasq | =2.15 | |
the kelleys dnsmasq | =2.12 | |
the kelleys dnsmasq | =2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2958 is classified as a denial of service vulnerability due to a NULL pointer dereference in dnsmasq.
To fix CVE-2009-2958, upgrade dnsmasq to version 2.50 or later.
Affected versions of dnsmasq include all versions before 2.50, such as 0.4 up to 2.49.
CVE-2009-2958 can be exploited by remote attackers sending a malformed TFTP RRQ request.
The impact of CVE-2009-2958 is a crash of the dnsmasq daemon, leading to a denial of service.