tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.
References
Link | Resource |
---|---|
https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ | Patch Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html | Mailing List Third Party Advisory |
Information
Published : 2021-09-13 14:15
Updated : 2021-11-30 11:38
NVD link : CVE-2021-41054
Mitre link : CVE-2021-41054
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
debian
- debian_linux
atftp_project
- atftp