CVE-2019-11365

NameCVE-2019-11365
DescriptionAn issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1783-1, DSA-4438-1
Debian Bugs927553

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
atftp (PTS)bullseye0.7.git20120829-3.3+deb11u2fixed
bookworm0.8.0-3fixed
sid, trixie0.8.0-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
atftpsourcejessie0.7.git20120829-1+deb8u1DLA-1783-1
atftpsourcestretch0.7.git20120829-3.1~deb9u1DSA-4438-1
atftpsource(unstable)0.7.git20120829-3.1927553

Notes

https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities
https://sourceforge.net/p/atftp/code/ci/abed7d245d8e8bdfeab24f9f7f55a52c3140f96b/

Search for package or bug name: Reporting problems