An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current->next.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1783-1 | atftp security update |
Debian DSA |
DSA-4438-1 | atftp security update |
EUVD |
EUVD-2019-3044 | An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current->next. |
Ubuntu USN |
USN-4540-1 | atftpd vulnerabilities |
Ubuntu USN |
USN-4643-1 | atftp vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:48:09.221Z
Reserved: 2019-04-20T00:00:00
Link: CVE-2019-11366
No data.
Status : Modified
Published: 2019-04-20T13:29:00.637
Modified: 2024-11-21T04:20:57.680
Link: CVE-2019-11366
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN