Check Point Reference: | CPAI-2009-237 |
Date Published: | 1 Oct 2009 |
Severity: | N/A |
Last Updated: | Thursday 01 January, 2009 |
Source: | Secunia Advisory: SA36394 |
Industry Reference: | |
Protection Provided by: | |
Who is Vulnerable? | Simon Kelly Dnsmasq prior to 2.50 |
Vulnerability Description | A buffer overflow vulnerability has been reported in Dnsmasq, a lightweight DNS forwarder and DHCP server, designed to provide DNS services to a small-scale network. The vulnerability is due to improper bounds checking when handling TFTP Read requests. A remote attacker can exploit this vulnerability by sending a specially crafted RRQ packet to the target server. Successful exploitation of this vulnerability can lead to arbitrary code execution within the security context of the affected service. |
Update/Patch Avaliable | The vendor, Simon Kelly, has released an advisory addressing this vulnerability: http://www.thekelleys.org.uk/dnsmasq/CHANGELOG |
Vulnerability Details | The vulnerability lies in the TFTP server embedded inDnsmasq. Specifically, the vulnerability is due to improper handling of long FileName values sent in an RRQ packet to the server. |