CVE-2019-11365

NameCVE-2019-11365
DescriptionAn issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1783-1, DSA-4438-1
NVD severityhigh
Debian Bugs927553

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
atftp (PTS)jessie0.7.git20120829-1vulnerable
jessie (security)0.7.git20120829-1+deb8u1fixed
stretch (security), stretch0.7.git20120829-3.1~deb9u1fixed
bullseye, sid, buster0.7.git20120829-3.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
atftpsource(unstable)0.7.git20120829-3.1927553
atftpsourcejessie0.7.git20120829-1+deb8u1DLA-1783-1
atftpsourcestretch0.7.git20120829-3.1~deb9u1DSA-4438-1

Notes

https://pulsesecurity.co.nz/advisories/atftpd-multiple-vulnerabilities
https://sourceforge.net/p/atftp/code/ci/abed7d245d8e8bdfeab24f9f7f55a52c3140f96b/

Search for package or bug name: Reporting problems