AT TFTP Server Long Filename Buffer Overflow Exploit Update 2

The vulnerability is caused due to a boundary error during the processing of TFTP Read/Write request packet types. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted packet with an overly long filename field. This update ensures that the program receives all data. This update fixes an error on Impact v12.3.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Thursday, June 7, 2012 - 00:00