AT TFTP Server Long Filename Buffer Overflow Exploit Update

The vulnerability is caused due to a boundary error during the processing of TFTP Read/Write request packet types. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted packet with an overly long filename field. This update ensures that the program receives all data.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Tuesday, March 20, 2012 - 00:00