Short Name |
DNS:OVERFLOW:TFTPD32 |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
DNS |
Keywords |
Tftpd32 DNS Server Buffer Overflow |
Release Date |
2014/05/05 |
Update Number |
2371 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Tftpd32. The vulnerability is due to an error in processing domain labels. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious DNS frame to an affected server. A successful exploitation attempt may result in the execution of arbitrary code in the security context of the Tftpd32 server. An unsuccessful attack attempt can result in a denial-of-service condition.