First published: Mon Sep 13 2021(Updated: )
tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
debian/atftp | 0.7.git20120829-3.2~deb10u3 0.7.git20120829-3.3+deb11u2 0.8.0-3 | |
Atftp Project Atftp | <=0.7.4 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41054 is a vulnerability in atftp through 0.7.4 that allows for a buffer overflow due to improper handling of buffer size.
The severity of CVE-2021-41054 is not mentioned in the provided information.
CVE-2021-41054 affects atftp versions up to and including 0.7.4.
To fix CVE-2021-41054, update atftp to version 0.7.5 or later, as recommended by the vendor.
You can find more information about CVE-2021-41054 in the provided references: [link1], [link2], [link3].