First published: Fri Feb 04 2022(Updated: )
options.c in atftp before 0.7.5 reads past the end of an array, and consequently discloses server-side /etc/group data to a remote client.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/atftp | 0.7.git20120829-3.2~deb10u3 0.7.git20120829-3.3+deb11u2 0.8.0-3 | |
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
ubuntu/atftp | <0.7. | 0.7. |
Atftp Project Atftp | <0.7.5 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-46671.
The title of this vulnerability is 'options.c in atftp before 0.7.5 reads past the end of an array and consequently discloses server-sid…'
The description of this vulnerability is that options.c in atftp before 0.7.5 reads past the end of an array, and consequently discloses server-side /etc/group data to a remote client.
The software affected by this vulnerability is atftp version 0.7.
Yes, there is a fix available for this vulnerability.