USN-4643-1: atftp vulnerabilities

Publication date

24 November 2020

Overview

atftp could be made to crash or run programs if it received specially crafted network traffic.

Releases


Packages

  • atftp - Advanced TFTP Server and Client

Details

It was discovered that atftp’s FTP server did not properly handler certain
input. An attacker could use this to to cause a denial of service (crash)
or possibly execute arbitrary code. (CVE-2019-11365)

It was discovered that atftp’s FTP server did not make proper use of
mutexes when locking certain data structures. An attacker could use this to
cause a denial of service via a NULL pointer dereference. (CVE-2019-11366)

It was discovered that atftp’s FTP server did not properly handler certain
input. An attacker could use this to to cause a denial of service (crash)
or possibly execute arbitrary code. (CVE-2019-11365)

It was discovered that atftp’s FTP server did not make proper use of
mutexes when locking certain data structures. An attacker could use this to
cause a denial of service via a NULL pointer dereference. (CVE-2019-11366)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
16.04 xenial atftp –  0.7.git20120829-3.1~0.16.04.1
atftpd –  0.7.git20120829-3.1~0.16.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›