Описание
Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.
Ссылки
- ExploitPatchVendor Advisory
- ExploitVendor Advisory
- ExploitPatchVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:net_integration_technologies_inc.:wvtftp:0.9:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06815
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.
EPSS
Процентиль: 91%
0.06815
Низкий
10 Critical
CVSS2
Дефекты
NVD-CWE-Other