Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Inetutils | Gnu | 1.4.2 (including) | 1.4.2 (including) |
| Tftp | Tftp | 0.29 (including) | 0.29 (including) |
| Tftp | Tftp | 0.32 (including) | 0.32 (including) |
| Tftp | Tftp | 0.34 (including) | 0.34 (including) |
| Tftp | Tftp | 0.36 (including) | 0.36 (including) |
| Tftp | Tftp | 0.38 (including) | 0.38 (including) |