Tftpd32 Error Message Format String

medium Nessus Plugin ID 20755

Synopsis

The remote tftp server is affected by a format string vulnerability.

Description

The remote host appears to be running Tftpd32, a tftpd server for Windows.

There is a format string vulnerability in versions of Tftpd32 up to and including 2.81 that may allow remote attackers to crash the server or to execute code on the affected host subject to the privileges under which the server operates, possibly SYSTEM since the application can be configured to run as a service.

Solution

Unknown at this time.

See Also

http://www.critical.lt/?vulnerabilities/200

https://www.securityfocus.com/archive/1/422405/30/0/threaded

Plugin Details

Severity: Medium

ID: 20755

File Name: tftpd32_format_string.nasl

Version: 1.21

Type: remote

Published: 1/20/2006

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, Services/udp/tftp

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/19/2006

Reference Information

CVE: CVE-2006-0328

BID: 16333