ID CVE-2004-1485
Summary Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
References
Vulnerable Configurations
  • cpe:2.3:a:gnu:inetutils:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:gnu:inetutils:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:tftp:tftp:0.29:*:*:*:*:*:*:*
    cpe:2.3:a:tftp:tftp:0.29:*:*:*:*:*:*:*
  • cpe:2.3:a:tftp:tftp:0.32:*:*:*:*:*:*:*
    cpe:2.3:a:tftp:tftp:0.32:*:*:*:*:*:*:*
  • cpe:2.3:a:tftp:tftp:0.34:*:*:*:*:*:*:*
    cpe:2.3:a:tftp:tftp:0.34:*:*:*:*:*:*:*
  • cpe:2.3:a:tftp:tftp:0.36:*:*:*:*:*:*:*
    cpe:2.3:a:tftp:tftp:0.36:*:*:*:*:*:*:*
  • cpe:2.3:a:tftp:tftp:0.38:*:*:*:*:*:*:*
    cpe:2.3:a:tftp:tftp:0.38:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 11527
bugtraq 20041026 inetutils tftp client, DNS resolving bofs
xf inetutils-tftp-dns-bo(17878)
Last major update 11-07-2017 - 01:31
Published 31-12-2004 - 05:00
Last modified 11-07-2017 - 01:31
Back to Top