Debian DSA-1876-1 : dnsmasq - buffer overflow

medium Nessus Plugin ID 44741

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Several remote vulnerabilities have been discovered in the TFTP component of dnsmasq. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2009-2957 A buffer overflow in TFTP processing may enable arbitrary code execution to attackers which are permitted to use the TFTP service.

- CVE-2009-2958 Malicious TFTP clients may crash dnsmasq, leading to denial of service.

Solution

Upgrade the dnsmasq packages.

The old stable distribution is not affected by these problems.

For the stable distribution (lenny), these problems have been fixed in version 2.45-1+lenny1.

See Also

https://security-tracker.debian.org/tracker/CVE-2009-2957

https://security-tracker.debian.org/tracker/CVE-2009-2958

https://www.debian.org/security/2009/dsa-1876

Plugin Details

Severity: Medium

ID: 44741

File Name: debian_DSA-1876.nasl

Version: 1.13

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:dnsmasq, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/1/2009

Reference Information

CVE: CVE-2009-2957, CVE-2009-2958

BID: 36120

CWE: 119, 399

DSA: 1876