CVE-2019-11365

Published: 20 April 2019

An issue was discovered in atftpd in atftp 0.7.1. A remote attacker may send a crafted packet triggering a stack-based buffer overflow due to an insecurely implemented strncpy call. The vulnerability is triggered by sending an error packet of 3 bytes or fewer. There are multiple instances of this vulnerable strncpy pattern within the code base, specifically within tftpd_file.c, tftp_file.c, tftpd_mtftp.c, and tftp_mtftp.c.

From the Ubuntu security team

It was discovered that atftp's FTP server did not properly handler certain input. An attacker could use this to to cause a denial of service (crash) or possibly execute arbitrary code.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
atftp
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(0.7.git20120829-3.1)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(0.7.git20120829-3.1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(0.7.git20120829-3.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (0.7.20120829-3.1~0.18.04.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (0.7.20120829-3.1~0.16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needs-triage)
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist