First published: Sat Apr 20 2019(Updated: )
An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atftp Project Atftp | =0.7.1 | |
debian/atftp | 0.7.git20120829-3.3+deb11u2 0.8.0-3 0.8.0-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-11365 is critical with a CVSS score of 9.8.
CVE-2019-11365 allows a remote attacker to trigger a stack-based buffer overflow in atftpd in atftp 0.7.1.
CVE-2019-11365 can be triggered by sending an error packet of 3 bytes or fewer to the vulnerable atftpd service.
The affected software for CVE-2019-11365 includes atftp versions 0.7.git20120829-3.2~deb10u3, 0.7.git20120829-3.3+deb11u2, and 0.8.0-3 in Debian, and atftp version 0.7.20120829-3.1~0.18.04.1 in Ubuntu 18.04 LTS (Bionic) and 0.7.20120829-3.1~0.16.04.1 in Ubuntu 16.04 LTS (Xenial).
To remediate CVE-2019-11365, it is recommended to update the atftp package to the fixed versions: 0.7.git20120829-3.2~deb10u3, 0.7.git20120829-3.3+deb11u2, or 0.8.0-3 in Debian, and 0.7.20120829-3.1~0.18.04.1 in Ubuntu 18.04 LTS (Bionic) or 0.7.20120829-3.1~0.16.04.1 in Ubuntu 16.04 LTS (Xenial).