7.5
CVSSv2

CVE-2019-11365

Published: 20/04/2019 Updated: 28/09/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atftp project atftp 0.7.1

Vendor Advisories

Debian Bug report logs - #927553 atftp: CVE-2019-11365 CVE-2019-11366 Package: src:atftp; Maintainer for src:atftp is Ludovic Drolez <ldrolez@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 Apr 2019 18:46:37 UTC Severity: grave Tags: patch, security, upstream Found in version atftp/0 ...
Denis Andzakovic discovered two vulnerabilities in atftp, the advanced TFTP server which could result in denial of service by sending malformed packets For the stable distribution (stretch), these problems have been fixed in version 07git20120829-31~deb9u1 We recommend that you upgrade your atftp packages For the detailed security status of a ...

Github Repositories

static-analyzer-c-rules Porting some rules from semgrep name ---- insecure-use-gets-fn description ----------- Avoid 'gets()' This function does not consider buffer boundaries and can lead to buffer overflows Use 'fgets()' or 'gets_s()' instead cwe --- 'CWE-676: Use of Potentially Dangerous Function' references ---------- https:/

static-analyzer-c-rules Porting some rules from semgrep name ---- insecure-use-gets-fn description ----------- Avoid 'gets()' This function does not consider buffer boundaries and can lead to buffer overflows Use 'fgets()' or 'gets_s()' instead cwe --- 'CWE-676: Use of Potentially Dangerous Function' references ---------- https:/