Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Inetutils | Gnu | 1.4.2 (including) | 1.4.2 (including) |
Tftp | Tftp | 0.29 (including) | 0.29 (including) |
Tftp | Tftp | 0.32 (including) | 0.32 (including) |
Tftp | Tftp | 0.34 (including) | 0.34 (including) |
Tftp | Tftp | 0.36 (including) | 0.36 (including) |
Tftp | Tftp | 0.38 (including) | 0.38 (including) |