CVE-2004-1485

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:inetutils:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.29:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.32:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.34:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.36:*:*:*:*:*:*:*
cpe:2.3:a:tftp:tftp:0.38:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109882085912915&w=2 - () http://marc.info/?l=bugtraq&m=109882085912915&w=2 -
References () http://www.securityfocus.com/bid/11527 - () http://www.securityfocus.com/bid/11527 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17878 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17878 -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1485

Mitre link : CVE-2004-1485

CVE.ORG link : CVE-2004-1485


JSON object : View

Products Affected

gnu

  • inetutils

tftp

  • tftp