Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.
2004-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | inetutils | 1.4.2 | No |
Application | tftp | tftp | 0.29 | No |
Application | tftp | tftp | 0.32 | No |
Application | tftp | tftp | 0.34 | No |
Application | tftp | tftp | 0.36 | No |
Application | tftp | tftp | 0.38 | No |