First published: Sat Apr 20 2019(Updated: )
An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current->next.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atftp Project Atftp | =0.7.1 | |
debian/atftp | 0.7.git20120829-3.3+deb11u2 0.8.0-3 0.8.0-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11366 is a vulnerability discovered in atftpd in atftp 0.7.1 that allows for a denial of service attack due to a NULL pointer dereference.
CVE-2019-11366 has a severity score of 5.9, which is considered medium.
CVE-2019-11366 affects atftp versions 0.7.git20120829-3.2~deb10u3, 0.7.git20120829-3.3+deb11u2, and 0.8.0-3.
Debian users should update to version 0.7.git20120829-3.2~deb10u3 or 0.7.git20120829-3.3+deb11u2, while Ubuntu users should update to version 0.7.20120829-3.1~0.18.04.1 for Bionic Beaver or 0.7.20120829-3.1~0.16.04.1 for Xenial Xerus.
CVE-2019-11366 is associated with CWE ID 476.