Check Point Advisories

Preemptive Protection against Dnsmasq TFTP Service Remote Heap Buffer Overflow

Check Point Reference: CPAI-2009-237
Date Published: 1 Oct 2009
Severity: N/A
Last Updated: Thursday 01 January, 2009
Source: Secunia Advisory: SA36394
Industry Reference:

CVE-2009-2957

Protection Provided by:
Who is Vulnerable? Simon Kelly Dnsmasq prior to 2.50
Vulnerability Description A buffer overflow vulnerability has been reported in Dnsmasq, a lightweight DNS forwarder and DHCP server, designed to provide DNS services to a small-scale network. The vulnerability is due to improper bounds checking when handling TFTP Read requests. A remote attacker can exploit this vulnerability by sending a specially crafted RRQ packet to the target server. Successful exploitation of this vulnerability can lead to arbitrary code execution within the security context of the affected service.
Update/Patch AvaliableThe vendor, Simon Kelly, has released an advisory addressing this vulnerability:
http://www.thekelleys.org.uk/dnsmasq/CHANGELOG 
Vulnerability DetailsThe vulnerability lies in the TFTP server embedded inDnsmasq. Specifically, the vulnerability is due to improper handling of long FileName values sent in an RRQ packet to the server.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK