Vulnerability Description
Format string vulnerability in the client in Tftpd32 before 4.50 allows remote servers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the Remote File field.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Philippe Jounin | Tftpd32 | <= 4.00 |
Related Weaknesses (CWE)
References
- http://osvdb.org/100511
- http://packetstormsecurity.com/files/124275/Tftpd32-Client-Side-Format-String.htExploit
- http://seclists.org/fulldisclosure/2013/Dec/15ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89455
- http://osvdb.org/100511
- http://packetstormsecurity.com/files/124275/Tftpd32-Client-Side-Format-String.htExploit
- http://seclists.org/fulldisclosure/2013/Dec/15ExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89455
FAQ
What is CVE-2013-6809?
CVE-2013-6809 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Format string vulnerability in the client in Tftpd32 before 4.50 allows remote servers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the Remot...
How severe is CVE-2013-6809?
CVE-2013-6809 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6809?
Check the references section above for vendor advisories and patch information. Affected products include: Philippe Jounin Tftpd32.