4.3
CVSSv2

CVE-2019-11366

Published: 20/04/2019 Updated: 28/09/2020
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue exists in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current->next.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

atftp project atftp 0.7.1

Vendor Advisories

Debian Bug report logs - #927553 atftp: CVE-2019-11365 CVE-2019-11366 Package: src:atftp; Maintainer for src:atftp is Ludovic Drolez <ldrolez@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 Apr 2019 18:46:37 UTC Severity: grave Tags: patch, security, upstream Found in version atftp/0 ...
Denis Andzakovic discovered two vulnerabilities in atftp, the advanced TFTP server which could result in denial of service by sending malformed packets For the stable distribution (stretch), these problems have been fixed in version 07git20120829-31~deb9u1 We recommend that you upgrade your atftp packages For the detailed security status of a ...