Short Name |
DNS:OVERFLOW:TFTPD32 |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
DNS |
Keywords |
Tftpd32 DNS Server Buffer Overflow |
Release Date |
2014/05/05 |
Update Number |
2371 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Tftpd32. The vulnerability is due to an error in processing domain labels. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious DNS frame to an affected server. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the Tftpd32 server. An unsuccessful attack attempt can result in a denial-of-service condition.