Lucene search

K
nvd[email protected]NVD:CVE-2009-2958
HistorySep 02, 2009 - 3:30 p.m.

CVE-2009-2958

2009-09-0215:30:01
CWE-399
web.nvd.nist.gov
6

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.2

Confidence

Low

EPSS

0.036

Percentile

91.6%

The tftp_request function in tftp.c in dnsmasq before 2.50, when --enable-tftp is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a TFTP read (aka RRQ) request with a malformed blksize option.

Affected configurations

Nvd
Node
thekelleysdnsmasqRange≀2.49
OR
thekelleysdnsmasqMatch0.4
OR
thekelleysdnsmasqMatch0.5
OR
thekelleysdnsmasqMatch0.6
OR
thekelleysdnsmasqMatch0.7
OR
thekelleysdnsmasqMatch0.95
OR
thekelleysdnsmasqMatch0.96
OR
thekelleysdnsmasqMatch0.98
OR
thekelleysdnsmasqMatch0.992
OR
thekelleysdnsmasqMatch0.996
OR
thekelleysdnsmasqMatch1.0
OR
thekelleysdnsmasqMatch1.2
OR
thekelleysdnsmasqMatch1.3
OR
thekelleysdnsmasqMatch1.4
OR
thekelleysdnsmasqMatch1.5
OR
thekelleysdnsmasqMatch1.6
OR
thekelleysdnsmasqMatch1.7
OR
thekelleysdnsmasqMatch1.8
OR
thekelleysdnsmasqMatch1.9
OR
thekelleysdnsmasqMatch1.10
OR
thekelleysdnsmasqMatch1.11
OR
thekelleysdnsmasqMatch1.12
OR
thekelleysdnsmasqMatch1.13
OR
thekelleysdnsmasqMatch1.14
OR
thekelleysdnsmasqMatch1.15
OR
thekelleysdnsmasqMatch1.16
OR
thekelleysdnsmasqMatch1.17
OR
thekelleysdnsmasqMatch1.18
OR
thekelleysdnsmasqMatch2.0
OR
thekelleysdnsmasqMatch2.1
OR
thekelleysdnsmasqMatch2.2
OR
thekelleysdnsmasqMatch2.3
OR
thekelleysdnsmasqMatch2.4
OR
thekelleysdnsmasqMatch2.5
OR
thekelleysdnsmasqMatch2.6
OR
thekelleysdnsmasqMatch2.7
OR
thekelleysdnsmasqMatch2.8
OR
thekelleysdnsmasqMatch2.9
OR
thekelleysdnsmasqMatch2.10
OR
thekelleysdnsmasqMatch2.11
OR
thekelleysdnsmasqMatch2.12
OR
thekelleysdnsmasqMatch2.13
OR
thekelleysdnsmasqMatch2.14
OR
thekelleysdnsmasqMatch2.15
OR
thekelleysdnsmasqMatch2.16
OR
thekelleysdnsmasqMatch2.17
OR
thekelleysdnsmasqMatch2.18
OR
thekelleysdnsmasqMatch2.19
OR
thekelleysdnsmasqMatch2.20
OR
thekelleysdnsmasqMatch2.21
OR
thekelleysdnsmasqMatch2.22
OR
thekelleysdnsmasqMatch2.23
OR
thekelleysdnsmasqMatch2.24
OR
thekelleysdnsmasqMatch2.25
OR
thekelleysdnsmasqMatch2.26
OR
thekelleysdnsmasqMatch2.27
OR
thekelleysdnsmasqMatch2.28
OR
thekelleysdnsmasqMatch2.29
OR
thekelleysdnsmasqMatch2.30
OR
thekelleysdnsmasqMatch2.31
OR
thekelleysdnsmasqMatch2.33
OR
thekelleysdnsmasqMatch2.34
OR
thekelleysdnsmasqMatch2.35
OR
thekelleysdnsmasqMatch2.36
OR
thekelleysdnsmasqMatch2.37
OR
thekelleysdnsmasqMatch2.38
OR
thekelleysdnsmasqMatch2.39
OR
thekelleysdnsmasqMatch2.40
OR
thekelleysdnsmasqMatch2.41
OR
thekelleysdnsmasqMatch2.42
OR
thekelleysdnsmasqMatch2.43
OR
thekelleysdnsmasqMatch2.44
OR
thekelleysdnsmasqMatch2.45
OR
thekelleysdnsmasqMatch2.46
OR
thekelleysdnsmasqMatch2.47
OR
thekelleysdnsmasqMatch2.48

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

AI Score

6.2

Confidence

Low

EPSS

0.036

Percentile

91.6%