First published: Thu Sep 10 2020(Updated: )
An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
Credit: talos-cna@cisco.com talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atftp Project Atftp | =0.7.git20120829-3.1\+b1 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.2 | |
debian/atftp | 0.7.git20120829-3.2~deb10u3 0.7.git20120829-3.3+deb11u2 0.8.0-3 | |
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-6097.
The severity of CVE-2020-6097 is not mentioned in the provided information.
The atftp software versions 0.7.git20120829-3.1+b1 and lower are affected by CVE-2020-6097.
CVE-2020-6097 can be exploited by sending a specially crafted sequence of RRQ-Multicast requests.
Yes, there are remediation steps available to fix CVE-2020-6097, but the specifics are not mentioned in the provided information. It is recommended to follow the recommendations provided by the software vendor or relevant security advisories.