TFTPD Server Filename Handling Remote Overflow

high Nessus Plugin ID 18264

Synopsis

The remote host has an application that is affected by a buffer overflow vulnerability.

Description

The remote TFTP server dies when it receives a too big UDP datagram.
An attacker may use this flaw to disable the server, or even execute arbitrary code on the system.

Solution

Upgrade software, or disable this service.

Plugin Details

Severity: High

ID: 18264

File Name: tftpd_overflow.nasl

Version: 1.22

Type: remote

Published: 5/16/2005

Updated: 8/15/2022

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, Services/udp/tftp

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/25/2002

Reference Information

CVE: CVE-2002-0813, CVE-2003-0380

BID: 401, 5328, 7819

CWE: 119