How to Buy
This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.
The remote tftp server is affected by a format string vulnerability.
The remote host appears to be running Tftpd32, a tftpd server for
There is a format string vulnerability in versions of Tftpd32 up to
and including 2.81 that may allow remote attackers to crash the server
or to execute code on the affected host subject to the privileges
under which the server operates, possibly SYSTEM since the application
can be configured to run as a service.
See also :
Unknown at this time.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.5
Public Exploit Available : true
Family: Gain a shell remotely
Nessus Plugin ID: 20755 ()
Bugtraq ID: 16333
CVE ID: CVE-2006-0328
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.