'Heap-based buffer overflow in the tftp_request function in tftp.c in dnsmasq before 2.50, when –enable-tftp is used, might allow remote attackers to execute arbitrary code via a long filename in a TFTP packet, as demonstrated by a read (aka RRQ) request.'
This issue was resolved in a backported fix. Current up to date versions not affected.
This issue does not affect ClearOS 6.x. This issue was resolved in ClearOS 5.1 and subsequent versions. The default settings of DNSMasq does not have the TFTP feature enabled. This issue can only affect Clarkconnect 5.0 systems that were not updated or ClearOS 5.1 beta versions that were not updated. All ClearOS systems running current updates are not affected.
Ensure that your system is up to date.