Vulnerability Description
Buffer overflow in vxTftpSrv 1.7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TFTP request with a long filename argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cambridge Computer Corporation | Vxtftpsrv | 1.7 |
References
- http://secunia.com/advisories/16840Vendor Advisory
- http://securitytracker.com/id?1014912Vendor Advisory
- http://www.airscanner.com/security/05081203_vxtftpsrv.htmExploitVendor Advisory
- http://www.securityfocus.com/bid/14842
- http://secunia.com/advisories/16840Vendor Advisory
- http://securitytracker.com/id?1014912Vendor Advisory
- http://www.airscanner.com/security/05081203_vxtftpsrv.htmExploitVendor Advisory
- http://www.securityfocus.com/bid/14842
FAQ
What is CVE-2005-3032?
CVE-2005-3032 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in vxTftpSrv 1.7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a TFTP request with a long filename argument.
How severe is CVE-2005-3032?
CVE-2005-3032 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3032?
Check the references section above for vendor advisories and patch information. Affected products include: Cambridge Computer Corporation Vxtftpsrv.