CVE-2008-1611

Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote attackers to cause a denial of service or execute arbitrary code via a long filename in a read or write request.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tftp-server:winagents_tftp_server:sp_1.4:*:windows:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://secunia.com/advisories/29508 - Vendor Advisory () http://secunia.com/advisories/29508 - Vendor Advisory
References () http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt - Exploit () http://www.offensive-security.com/0day/sourceforge-tftpd.py.txt - Exploit
References () http://www.securityfocus.com/bid/28462 - () http://www.securityfocus.com/bid/28462 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41496 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41496 -
References () https://www.exploit-db.com/exploits/5314 - () https://www.exploit-db.com/exploits/5314 -

Information

Published : 2008-04-01 16:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1611

Mitre link : CVE-2008-1611

CVE.ORG link : CVE-2008-1611


JSON object : View

Products Affected

tftp-server

  • winagents_tftp_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer