An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029 | Exploit Technical Description Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00058.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html | Mailing List Third Party Advisory |
Information
Published : 2020-09-10 08:15
Updated : 2022-05-12 10:23
NVD link : CVE-2020-6097
Mitre link : CVE-2020-6097
JSON object : View
CWE
CWE-617
Reachable Assertion
Products Affected
debian
- debian_linux
opensuse
- leap
atftp_project
- atftp