From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1MpSDX-0004kE-TS for garchives@archives.gentoo.org; Sun, 20 Sep 2009 19:37:04 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 1B737E0A10; Sun, 20 Sep 2009 19:35:04 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 3C174E07A1 for ; Sun, 20 Sep 2009 19:32:06 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp.gentoo.org (Postfix) with ESMTP id 10649676F7 for ; Sun, 20 Sep 2009 19:32:05 +0000 (UTC) X-Virus-Scanned: amavisd-new at gentoo.org X-Spam-Score: -3.255 X-Spam-Level: X-Spam-Status: No, score=-3.255 required=5.5 tests=[AWL=-0.656, BAYES_00=-2.599] Received: from smtp.gentoo.org ([127.0.0.1]) by localhost (smtp.gentoo.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iR+BMn38tBnu for ; Sun, 20 Sep 2009 19:31:58 +0000 (UTC) Received: from mail.netloc.info (mail.netloc.info [84.16.251.62]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTP id CE392B4A43 for ; Sun, 20 Sep 2009 18:59:36 +0000 (UTC) Received: from mail.netloc.info (p50819065.dip0.t-ipconnect.de [80.129.144.101]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mail.netloc.info (Postfix) with ESMTPSA id 2756F9F676; Sun, 20 Sep 2009 20:59:32 +0200 (CEST) Date: Sun, 20 Sep 2009 20:58:46 +0200 From: Alex Legler To: gentoo-announce@lists.gentoo.org Cc: bugtraq@securityfocus.com, full-disclosure@lists.grok.org.uk, security-alerts@linuxsecurity.com Subject: [gentoo-announce] [ GLSA 200909-19 ] Dnsmasq: Multiple vulnerabilities Message-ID: <20090920205846.30e02ac3@mail.netloc.info> X-Mailer: Claws Mail 3.7.2 (GTK+ 2.16.5; x86_64-pc-linux-gnu) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org Mime-Version: 1.0 Content-Type: multipart/signed; micalg=PGP-SHA1; boundary="Sig_/Lyr6NesBpbJBRR+XsTG=rqL"; protocol="application/pgp-signature" X-Archives-Salt: 4a342bd6-aa51-45d7-abf6-d8839d5bb60d X-Archives-Hash: 68dfba6a662b2d5428a5069404716b0d --Sig_/Lyr6NesBpbJBRR+XsTG=rqL Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200909-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Dnsmasq: Multiple vulnerabilities Date: September 20, 2009 Bugs: #282653 ID: 200909-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities in Dnsmasq might result in the remote execution of arbitrary code, or a Denial of Service. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Dnsmasq is a lightweight, easy to configure DNS forwarder and DHCP server. It includes support for Trivial FTP (TFTP). Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/dnsmasq < 2.5.0 >=3D 2.5.0 Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Multiple vulnerabilities have been reported in the TFTP functionality included in Dnsmasq: * Pablo Jorge and Alberto Solino discovered a heap-based buffer overflow (CVE-2009-2957). * An anonymous researcher reported a NULL pointer reference (CVE-2009-2958). Impact =3D=3D=3D=3D=3D=3D A remote attacker in the local network could exploit these vulnerabilities by sending specially crafted TFTP requests to a machine running Dnsmasq, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the daemon, or a Denial of Service. NOTE: The TFTP server is not enabled by default. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D You can disable the TFTP server either at buildtime by not enabling the "tftp" USE flag, or at runtime. Make sure "--enable-tftp" is not set in the DNSMASQ_OPTS variable in the /etc/conf.d/dnsmasq file and "enable-tftp" is not set in /etc/dnsmasq.conf, either of which would enable TFTP support if it is compiled in. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All Dnsmasq users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose =3Dnet-dns/dnsmasq-2.5.0 References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2009-2957 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-2957 [ 2 ] CVE-2009-2958 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2009-2958 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200909-19.xml Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --Sig_/Lyr6NesBpbJBRR+XsTG=rqL Content-Type: application/pgp-signature; name=signature.asc Content-Disposition: attachment; filename=signature.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.11 (GNU/Linux) iEYEARECAAYFAkq2e4MACgkQk+oqhfPAZGl1ewCfSxGVHQDo4x/IwpuopYMypnmk MJwAn1ieE6RazXkkSvorQNcToCH1t/JS =lpzc -----END PGP SIGNATURE----- --Sig_/Lyr6NesBpbJBRR+XsTG=rqL--