NULL Pointer Dereference Affecting atftp package, versions <0.7.git20120829-3.1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
2.06% (89th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN11-ATFTP-530449
  • published20 Apr 2019
  • disclosed20 Apr 2019

Introduced: 20 Apr 2019

CVE-2019-11366  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade Debian:11 atftp to version 0.7.git20120829-3.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream atftp package and not the atftp package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

An issue was discovered in atftpd in atftp 0.7.1. It does not lock the thread_list_mutex mutex before assigning the current thread data structure. As a result, the daemon is vulnerable to a denial of service attack due to a NULL pointer dereference. If thread_data is NULL when assigned to current, and modified by another thread before a certain tftpd_list.c check, there is a crash when dereferencing current->next.