Lucene search

K
nvd[email protected]NVD:CVE-2009-2957
HistorySep 02, 2009 - 3:30 p.m.

CVE-2009-2957

2009-09-0215:30:01
CWE-119
web.nvd.nist.gov
9

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.6

Confidence

Low

EPSS

0.269

Percentile

96.8%

Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.

Affected configurations

Nvd
Node
thekelleysdnsmasqRange≀2.49
OR
thekelleysdnsmasqMatch0.4
OR
thekelleysdnsmasqMatch0.5
OR
thekelleysdnsmasqMatch0.6
OR
thekelleysdnsmasqMatch0.7
OR
thekelleysdnsmasqMatch0.95
OR
thekelleysdnsmasqMatch0.96
OR
thekelleysdnsmasqMatch0.98
OR
thekelleysdnsmasqMatch0.992
OR
thekelleysdnsmasqMatch0.996
OR
thekelleysdnsmasqMatch1.0
OR
thekelleysdnsmasqMatch1.2
OR
thekelleysdnsmasqMatch1.3
OR
thekelleysdnsmasqMatch1.4
OR
thekelleysdnsmasqMatch1.5
OR
thekelleysdnsmasqMatch1.6
OR
thekelleysdnsmasqMatch1.7
OR
thekelleysdnsmasqMatch1.8
OR
thekelleysdnsmasqMatch1.9
OR
thekelleysdnsmasqMatch1.10
OR
thekelleysdnsmasqMatch1.11
OR
thekelleysdnsmasqMatch1.12
OR
thekelleysdnsmasqMatch1.13
OR
thekelleysdnsmasqMatch1.14
OR
thekelleysdnsmasqMatch1.15
OR
thekelleysdnsmasqMatch1.16
OR
thekelleysdnsmasqMatch1.17
OR
thekelleysdnsmasqMatch1.18
OR
thekelleysdnsmasqMatch2.0
OR
thekelleysdnsmasqMatch2.1
OR
thekelleysdnsmasqMatch2.2
OR
thekelleysdnsmasqMatch2.3
OR
thekelleysdnsmasqMatch2.4
OR
thekelleysdnsmasqMatch2.5
OR
thekelleysdnsmasqMatch2.6
OR
thekelleysdnsmasqMatch2.7
OR
thekelleysdnsmasqMatch2.8
OR
thekelleysdnsmasqMatch2.9
OR
thekelleysdnsmasqMatch2.10
OR
thekelleysdnsmasqMatch2.11
OR
thekelleysdnsmasqMatch2.12
OR
thekelleysdnsmasqMatch2.13
OR
thekelleysdnsmasqMatch2.14
OR
thekelleysdnsmasqMatch2.15
OR
thekelleysdnsmasqMatch2.16
OR
thekelleysdnsmasqMatch2.17
OR
thekelleysdnsmasqMatch2.18
OR
thekelleysdnsmasqMatch2.19
OR
thekelleysdnsmasqMatch2.20
OR
thekelleysdnsmasqMatch2.21
OR
thekelleysdnsmasqMatch2.22
OR
thekelleysdnsmasqMatch2.23
OR
thekelleysdnsmasqMatch2.24
OR
thekelleysdnsmasqMatch2.25
OR
thekelleysdnsmasqMatch2.26
OR
thekelleysdnsmasqMatch2.27
OR
thekelleysdnsmasqMatch2.28
OR
thekelleysdnsmasqMatch2.29
OR
thekelleysdnsmasqMatch2.30
OR
thekelleysdnsmasqMatch2.31
OR
thekelleysdnsmasqMatch2.33
OR
thekelleysdnsmasqMatch2.34
OR
thekelleysdnsmasqMatch2.35
OR
thekelleysdnsmasqMatch2.36
OR
thekelleysdnsmasqMatch2.37
OR
thekelleysdnsmasqMatch2.38
OR
thekelleysdnsmasqMatch2.39
OR
thekelleysdnsmasqMatch2.40
OR
thekelleysdnsmasqMatch2.41
OR
thekelleysdnsmasqMatch2.42
OR
thekelleysdnsmasqMatch2.43
OR
thekelleysdnsmasqMatch2.44
OR
thekelleysdnsmasqMatch2.45
OR
thekelleysdnsmasqMatch2.46
OR
thekelleysdnsmasqMatch2.47
OR
thekelleysdnsmasqMatch2.48

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.6

Confidence

Low

EPSS

0.269

Percentile

96.8%