First published: Wed Jun 01 2005(Updated: )
Multiple stack-based buffer overflows in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allow remote attackers to execute arbitrary code via a long (1) filename or (2) transfer mode string in a Read Request (RRQ) or Write Request (WRQ) packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FutureSoft TFTP Server Multithreaded | =1.0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1812 is rated as critical due to its potential for remote code execution.
To fix CVE-2005-1812, upgrade to a patched version of the FutureSoft TFTP Server or apply any available security updates.
CVE-2005-1812 includes multiple stack-based buffer overflows that can be exploited via overly long inputs.
Any user running FutureSoft TFTP Server Evaluation Version 1.0.0.1 is at risk of CVE-2005-1812.
An attacker can execute arbitrary code on the system running the vulnerable TFTP server by exploiting CVE-2005-1812.