First published: Fri Dec 31 2004(Updated: )
Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tftp Tftp Server | =0.34 | |
Tftp Tftp Server | =0.29 | |
Tftp Tftp Server | =0.32 | |
Tftp Tftp Server | =0.38 | |
Gnu Inet | =1.4.2 | |
Tftp Tftp Server | =0.36 | |
Gnu Inet | =1.4.2 | |
Tftp Tftp Server | =0.29 | |
Tftp Tftp Server | =0.32 | |
Tftp Tftp Server | =0.34 | |
Tftp Tftp Server | =0.36 | |
Tftp Tftp Server | =0.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1485 describes a buffer overflow in the TFTP client in InetUtils 1.4.2 that can be exploited by malicious DNS servers to execute arbitrary code.
CVE-2004-1485 affects TFTP versions 0.29, 0.32, 0.34, 0.36, and 0.38, as well as GNU InetUtils version 1.4.2.
Exploitation of CVE-2004-1485 can lead to remote execution of arbitrary code, potentially allowing attackers to take control of the affected system.
Organizations can mitigate risks from CVE-2004-1485 by upgrading to a version of TFTP or GNU InetUtils that is not vulnerable and disabling TFTP services if not needed.
The recommended action to resolve CVE-2004-1485 is to update the vulnerable software to a patched version that addresses this buffer overflow issue.