Heap-based buffer overflow in the WvTFTPServer::new_connection function in wvtftpserver.cc for WvTftp 0.9 allows remote attackers to execute arbitrary code via a long option string in a TFTP packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wvtftp | Net_integration_technologies_inc. | 0.9 (including) | 0.9 (including) |