tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html | Mailing List Third Party Advisory |
https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ | Patch Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html | Mailing List Third Party Advisory |
https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html - Mailing List, Third Party Advisory | |
References | () https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ - Patch, Third Party Advisory |
Information
Published : 2021-09-13 21:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41054
Mitre link : CVE-2021-41054
CVE.ORG link : CVE-2021-41054
JSON object : View
Products Affected
debian
- debian_linux
atftp_project
- atftp
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')