Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-1485

Опубликовано: 31 дек. 2004
Источник: debian

Описание

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
inetutilsnot-affectedpackage
atftpnot-affectedpackage
netkit-tftpnot-affectedpackage
tftp-hpanot-affectedpackage

Примечания

  • The address length comes from libc, not the network.

Связанные уязвимости

nvd
больше 20 лет назад

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

github
больше 3 лет назад

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.