tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options.
References
Link | Resource |
---|---|
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html | Mailing List Third Party Advisory |
https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ | Patch Third Party Advisory |
https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html | Mailing List Third Party Advisory |
https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 - Exploit, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html - Mailing List, Third Party Advisory | |
References | () https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ - Patch, Third Party Advisory |
30 Nov 2021, 19:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2021/11/msg00014.html - Mailing List, Third Party Advisory | |
References | (MISC) https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41054 - Exploit, Third Party Advisory |
17 Nov 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Oct 2021, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Sep 2021, 12:52
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://sourceforge.net/p/atftp/code/ci/d255bf90834fb45be52decf9bc0b4fb46c90f205/ - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:atftp_project:atftp:*:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
13 Sep 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-13 21:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41054
Mitre link : CVE-2021-41054
CVE.ORG link : CVE-2021-41054
JSON object : View
Products Affected
debian
- debian_linux
atftp_project
- atftp
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')