3CTftpSvc Long Transport Mode Remote Overflow

critical Nessus Plugin ID 23735

Synopsis

The remote TFTP server is affected by a buffer overflow vulnerability.

Description

The remote host appears to be running 3CTftpSvc, a TFTPD server for Windows.

The version of Tftpd32 installed on the remote host appears to be affected by a buffer overflow vulnerability involving a long transport mode when getting or putting files. By leveraging this flaw, a remote attacker may be able to crash the remote service or execute code on the affected host subject to the privileges under which the service operates, by default LOCAL SYSTEM.

Solution

Unknown at this time.

See Also

https://www.securityfocus.com/archive/1/452754/30/0/threaded

Plugin Details

Severity: Critical

ID: 23735

File Name: 3ctftpsvc_mode_overflow.nasl

Version: 1.24

Type: remote

Agent: windows

Family: Windows

Published: 11/28/2006

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:3com:3ctftpsvc

Required KB Items: Services/udp/tftp, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/26/2006

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (3CTftpSvc TFTP Long Mode Buffer Overflow)

Reference Information

CVE: CVE-2006-6183

BID: 21301, 21322