First published: Fri Dec 31 2004(Updated: )
Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tftp Tftp | =0.34 | |
Tftp Tftp | =0.29 | |
Tftp Tftp | =0.32 | |
Tftp Tftp | =0.38 | |
GNU inetutils | =1.4.2 | |
Tftp Tftp | =0.36 | |
GNU inetutils | =1.4.2 | |
Tftp Tftp | =0.29 | |
Tftp Tftp | =0.32 | |
Tftp Tftp | =0.34 | |
Tftp Tftp | =0.36 | |
Tftp Tftp | =0.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.