Arch Linux Security Advisory ASA-202101-24 ========================================== Severity: Medium Date : 2021-01-12 CVE-ID : CVE-2020-6097 Package : atftp Type : denial of service Remote : Yes Link : https://security.archlinux.org/AVG-1395 Summary ======= The package atftp before version 0.7.2-3 is vulnerable to denial of service. Resolution ========== Upgrade to 0.7.2-3. # pacman -Syu "atftp>=0.7.2-3" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== An exploitable denial of service vulnerability exists in the atftpd daemon functionality of atftp 0.7.2. A specially crafted sequence of RRQ-Multicast requests trigger an assert() call resulting in denial-of- service. An attacker can send a sequence of malicious packets to trigger this vulnerability. Impact ====== A malicious remote user might crash the application by performing a sequence of crafted queries. References ========== https://bugs.archlinux.org/task/69175 https://talosintelligence.com/vulnerability_reports/TALOS-2020-1029 https://sourceforge.net/u/peterkaestle/atftp/ci/96409ef3b9ca061f9527cfaafa778105cf15d994/ https://security.archlinux.org/CVE-2020-6097