CVE-2005-4882

tftpd in Philippe Jounin Tftpd32 2.74 and earlier, as used in Wyse Simple Imager (WSI) and other products, allows remote attackers to cause a denial of service (daemon crash) via a long filename in a TFTP read (aka RRQ or get) request, a different vulnerability than CVE-2002-2226.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:philippe_jounin:tftpd32:*:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.5:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.5:beta:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.51:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.52:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.53:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.54:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.60:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.62:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.70:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.72:*:*:*:*:*:*:*
cpe:2.3:a:philippe_jounin:tftpd32:2.73:*:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0386.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2005-01/0386.html - Exploit
References () http://securitytracker.com/id?1012856 - Exploit () http://securitytracker.com/id?1012856 - Exploit
References () http://secway.org/advisory/ad20050108.txt - Exploit () http://secway.org/advisory/ad20050108.txt - Exploit
References () http://www.kb.cert.org/vuls/id/632633 - US Government Resource () http://www.kb.cert.org/vuls/id/632633 - US Government Resource
References () http://www.osvdb.org/12898 - () http://www.osvdb.org/12898 -

Information

Published : 2009-11-20 19:30

Updated : 2024-11-21 00:05


NVD link : CVE-2005-4882

Mitre link : CVE-2005-4882

CVE.ORG link : CVE-2005-4882


JSON object : View

Products Affected

philippe_jounin

  • tftpd32
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer