Cisco TFTP Server Long Filename DoS (CSCdy03429)

high Nessus Plugin ID 11056

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Trivial File Transfer Protocol (TFTP) is a protocol which allows for easy transfer of files between network connected devices.

A vulnerability has been discovered in the processing of filenames within a TFTP read request when Cisco IOS is configured to act as a TFTP server.

This vulnerability is documented as Cisco Bug ID CSCdy03429.

Solution

http://www.nessus.org/u?1212ca9e

Plugin Details

Severity: High

ID: 11056

File Name: CSCdy03429.nasl

Version: 1.25

Type: local

Family: CISCO

Published: 7/30/2002

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/sysDesc, SNMP/community

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/25/2002

Reference Information

CVE: CVE-2002-0813

BID: 5328

CWE: 119