Search for packages
| purl | pkg:deb/debian/atftp@0.7.dfsg-9.1 |
| Next non-vulnerable version | 0.7.git20120829-3.3+deb11u2 |
| Latest non-vulnerable version | 0.7.git20120829-3.3+deb11u2 |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4ufj-j1bk-97g2
Aliases: CVE-2019-11365 |
Multiple vulnerabilities have been found in atftp, the worst of which could result in the execution of arbitrary code. |
Affected by 5 other vulnerabilities. Affected by 3 other vulnerabilities. |
|
VCID-8gv8-qwdd-5fd2
Aliases: CVE-2021-41054 |
tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data, OACK, and other options. |
Affected by 0 other vulnerabilities. |
|
VCID-p7hs-4pdm-2qcw
Aliases: CVE-2021-46671 |
options.c in atftp before 0.7.5 reads past the end of an array, and consequently discloses server-side /etc/group data to a remote client. |
Affected by 0 other vulnerabilities. |
|
VCID-qyq7-c3vf-bbew
Aliases: CVE-2019-11366 |
Multiple vulnerabilities have been found in atftp, the worst of which could result in the execution of arbitrary code. |
Affected by 5 other vulnerabilities. Affected by 3 other vulnerabilities. |
|
VCID-r2dj-7m5m-7fgq
Aliases: CVE-2020-6097 |
An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.git20120829-3.1+b1. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of-service. An attacker can send a sequence of malicious packets to trigger this vulnerability. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||