Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wvp8-r43g-4fmv

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

EPSS

Процентиль: 79%
0.01322
Низкий

Связанные уязвимости

nvd
больше 20 лет назад

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

debian
больше 20 лет назад

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote ma ...

EPSS

Процентиль: 79%
0.01322
Низкий