Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-1485

Опубликовано: 31 дек. 2004
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
inetutilsnot-affectedpackage
atftpnot-affectedpackage
netkit-tftpnot-affectedpackage
tftp-hpanot-affectedpackage

Примечания

  • The address length comes from libc, not the network.

EPSS

Процентиль: 82%
0.01636
Низкий

Связанные уязвимости

nvd
около 21 года назад

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

github
почти 4 года назад

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

EPSS

Процентиль: 82%
0.01636
Низкий