Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tftp | Tftp | 0.34 | 0.34 |
Tftp | Tftp | 0.29 | 0.29 |
Tftp | Tftp | 0.32 | 0.32 |
Tftp | Tftp | 0.38 | 0.38 |
Inetutils | Gnu | 1.4.2 | 1.4.2 |
Tftp | Tftp | 0.36 | 0.36 |