Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-11365

Опубликовано: 20 апр. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.

РелизСтатусПримечание
bionic

released

0.7.git20120829-3.1~0.18.04.1
cosmic

ignored

end of life
devel

not-affected

0.7.git20120829-3.1
disco

ignored

end of life
eoan

not-affected

0.7.git20120829-3.1
esm-apps/bionic

released

0.7.git20120829-3.1~0.18.04.1
esm-apps/focal

not-affected

0.7.git20120829-3.1
esm-apps/xenial

released

0.7.git20120829-3.1~0.16.04.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
focal

not-affected

0.7.git20120829-3.1

Показывать по

EPSS

Процентиль: 88%
0.03637
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 7 лет назад

An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.

CVSS3: 9.8
debian
почти 7 лет назад

An issue was discovered in atftpd in atftp 0.7.1. A remote attacker ma ...

github
больше 3 лет назад

An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.

CVSS3: 9.8
fstec
почти 7 лет назад

Уязвимость функции вызова strncpy Atftpd, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных или вызвать отказ в обслуживании

suse-cvrf
почти 7 лет назад

Security update for atftp

EPSS

Процентиль: 88%
0.03637
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3