An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpdfile.c, tftpfile.c, tftpdmtftp.c, and tftpmtftp.c.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.7.git20120829-3.1", "binary_name": "atftp" }, { "binary_version": "0.7.git20120829-3.1", "binary_name": "atftp-dbgsym" }, { "binary_version": "0.7.git20120829-3.1", "binary_name": "atftpd" }, { "binary_version": "0.7.git20120829-3.1", "binary_name": "atftpd-dbgsym" } ] }