AT-TFTP Server Filename Handling Remote Overflow

critical Nessus Plugin ID 23736

Synopsis

The remote tftp server is affected by a buffer overflow vulnerability.

Description

The remote host appears to be running AT-TFTP Server, a tftpd server for Windows.

The version of AT-TFTP Server installed on the remote host appears to be affected by a buffer overflow vulnerability involving a long filenames when getting or putting files. By leveraging this flaw, a remote attacker may be able to crash the remote service or to execute code on the affected host subject to the privileges under which the server operates.

Solution

Unknown at this time.

See Also

http://aluigi.altervista.org/adv/attftp-adv.txt

https://www.securityfocus.com/archive/1/452743/30/0/threaded

Plugin Details

Severity: Critical

ID: 23736

File Name: at_tftpd_long_filename_overflow.nasl

Version: 1.17

Type: remote

Published: 11/28/2006

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport, Services/udp/tftp

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 11/26/2006

Exploitable With

Core Impact

Metasploit (Allied Telesyn TFTP Server 1.9 Long Filename Overflow)

Reference Information

CVE: CVE-2006-6184

BID: 21320