This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote TFTP server can be used to read arbitrary files on the
The TFTP (Trivial File Transfer Protocol) server running on the remote
host is vulnerable to a directory traversal attack that allows an
attacker to read arbitrary files on the remote host by prepending
their names with directory traversal sequences.
Disable the remote TFTP daemon, run it in a chrooted environment, or
filter incoming traffic to this port.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.9
Public Exploit Available : true
Nessus Plugin ID: 18262 ()
Bugtraq ID: 6198115821158433287333443504042907482725044152938
CVE ID: CVE-1999-0183CVE-1999-0498CVE-2002-2353CVE-2009-0271CVE-2009-0288CVE-2009-1161
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.