Описание
Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:gnu:inetutils:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.29:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.32:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.34:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.36:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.38:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.01322
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 20 лет назад
Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote ma ...
github
больше 3 лет назад
Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
EPSS
Процентиль: 79%
0.01322
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other