ID CVE-2020-6097
Summary An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:a:atftp_project:atftp:0.7.git20120829-3.1\+b1:*:*:*:*:*:*:*
    cpe:2.3:a:atftp_project:atftp:0.7.git20120829-3.1\+b1:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 12-05-2022 - 17:23)
Impact:
Exploitability:
CWE CWE-617
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
misc https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029
suse openSUSE-SU-2020:1736
Last major update 12-05-2022 - 17:23
Published 10-09-2020 - 15:15
Last modified 12-05-2022 - 17:23
Back to Top