TFTPD Server Filename Handling Remote Overflow

high Nessus Plugin ID 18264


The remote host has an application that is affected by a buffer overflow vulnerability.


The remote TFTP server dies when it receives a too big UDP datagram.
An attacker may use this flaw to disable the server, or even execute arbitrary code on the system.


Upgrade software, or disable this service.

Plugin Details

Severity: High

ID: 18264

File Name: tftpd_overflow.nasl

Version: 1.22

Type: remote

Published: 5/16/2005

Updated: 8/15/2022

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.6


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport, Services/udp/tftp

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/25/2002

Reference Information

CVE: CVE-2002-0813, CVE-2003-0380

BID: 401, 5328, 7819

CWE: 119