Tftpd32 GET/PUT Command File Name Handling Overflow

Medium Nessus Plugin ID 23650


The remote TFTP server is affected by a buffer overflow vulnerability.


The remote host appears to be running Tftpd32, a tftpd server for Windows.

The version of Tftpd32 installed on the remote host appears to be affected by a buffer overflow vulnerability involving long filenames.
By leveraging this flaw, a remote attacker may be able to crash the server or to execute code on the affected host subject to the privileges under which the server operates, possibly SYSTEM since the application can be configured to run as a service.


Unknown at this time.

See Also

Plugin Details

Severity: Medium

ID: 23650

File Name: tftpd32_filename_overflow.nasl

Version: $Revision: 1.17 $

Type: remote

Agent: windows

Family: Windows

Published: 2006/11/18

Modified: 2014/05/26

Dependencies: 11819

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

Required KB Items: Services/udp/tftp, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/11/16

Reference Information

CVE: CVE-2006-6141

BID: 21148

OSVDB: 30502