Lucene search

K
cve[email protected]CVE-2004-1485
HistoryFeb 13, 2005 - 5:00 a.m.

CVE-2004-1485

2005-02-1305:00:00
web.nvd.nist.gov
26
cve-2004-1485
buffer overflow
inetutils
tftp client
remote code execution
dns
nvd

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.0%

Buffer overflow in the TFTP client in InetUtils 1.4.2 allows remote malicious DNS servers to execute arbitrary code via a large DNS response that is handled by the gethostbyname function.

Affected configurations

NVD
Node
gnuinetutilsMatch1.4.2
OR
tftptftpMatch0.29
OR
tftptftpMatch0.32
OR
tftptftpMatch0.34
OR
tftptftpMatch0.36
OR
tftptftpMatch0.38

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

77.0%

Related for CVE-2004-1485