Debian Atftp vulnerabilities
7 known vulnerabilities affecting debian/atftp.
Total CVEs
7
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH3MEDIUM2LOW1
Vulnerabilities
Page 1 of 1
CVE-2021-41054HIGHCVSS 7.5fixed in atftp 0.7.git20210915-1 (bookworm)2021
CVE-2021-41054 [HIGH] CVE-2021-41054: atftp - tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size ha...
tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.
Scope: local
bookworm: resolved (fixed in 0.7.git20210915-1)
bullseye: resolved (fixed in 0.7.git20120829-3.3+deb11u1)
forky: resolved (fixed in 0.7.git20210915-1)
sid: resolved (fixed in 0.7.git20210915-1)
debian
CVE-2021-46671MEDIUMCVSS 5.3fixed in atftp 0.7.git20210915-1 (bookworm)2021
CVE-2021-46671 [MEDIUM] CVE-2021-46671: atftp - options.c in atftp before 0.7.5 reads past the end of an array, and consequently...
options.c in atftp before 0.7.5 reads past the end of an array, and consequently discloses server-side /etc/group data to a remote client.
Scope: local
bookworm: resolved (fixed in 0.7.git20210915-1)
bullseye: resolved (fixed in 0.7.git20120829-3.3+deb11u2)
forky: resolved (fixed in 0.7.git20210915-1)
sid: resolved (fixed in 0.7.git20210915-1)
trixie: resolved (fixe
debian
CVE-2020-6097HIGHCVSS 7.5fixed in atftp 0.7.git20120829-3.2 (bookworm)2020
CVE-2020-6097 [HIGH] CVE-2020-6097: atftp - An exploitable denial of service vulnerability exists in the atftpd daemon funct...
An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
Scope: local
bookworm: resolved (fixed in 0.7.git20120
debian
CVE-2019-11365CRITICALCVSS 9.8fixed in atftp 0.7.git20120829-3.1 (bookworm)2019
CVE-2019-11365 [CRITICAL] CVE-2019-11365: atftp - An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a c...
An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within
debian
CVE-2019-11366MEDIUMCVSS 5.9fixed in atftp 0.7.git20120829-3.1 (bookworm)2019
CVE-2019-11366 [MEDIUM] CVE-2019-11366: atftp - An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_li...
An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, t
debian
CVE-2004-1485LOWCVSS 7.52004
CVE-2004-1485 [HIGH] CVE-2004-1485: atftp - Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DN...
Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2003-0380HIGHCVSS 7.5PoCfixed in atftp 0.6.2 (bookworm)2003
CVE-2003-0380 [HIGH] CVE-2003-0380: atftp - Buffer overflow in atftp daemon (atftpd) 0.6.1 and earlier, and possibly later v...
Buffer overflow in atftp daemon (atftpd) 0.6.1 and earlier, and possibly later versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long filename.
Scope: local
bookworm: resolved (fixed in 0.6.2)
bullseye: resolved (fixed in 0.6.2)
forky: resolved (fixed in 0.6.2)
sid: resolved (fixed in 0.6.2)
trixie: resolved
debian