First published: Tue Mar 13 2007(Updated: )
Buffer overflow in D-Link TFTP Server 1.0 allows remote attackers to cause a denial of service (crash) via a long (1) GET or (2) PUT request, which triggers memory corruption. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link TFTP Server | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1435 has a high severity due to the potential for remote denial of service attacks.
To fix CVE-2007-1435, upgrade to a patched version of D-Link TFTP Server or consider using alternative software.
CVE-2007-1435 can be exploited through crafted long GET or PUT requests resulting in a buffer overflow.
CVE-2007-1435 affects D-Link TFTP Server version 1.0.
Yes, CVE-2007-1435 can be exploited remotely by attackers sending malicious requests.