3CTftpSvc Long Transport Mode Remote Overflow

Critical Nessus Plugin ID 23735


The remote TFTP server is affected by a buffer overflow vulnerability.


The remote host appears to be running 3CTftpSvc, a TFTPD server for Windows.

The version of Tftpd32 installed on the remote host appears to be affected by a buffer overflow vulnerability involving a long transport mode when getting or putting files. By leveraging this flaw, a remote attacker may be able to crash the remote service or execute code on the affected host subject to the privileges under which the service operates, by default LOCAL SYSTEM.


Unknown at this time.

See Also


Plugin Details

Severity: Critical

ID: 23735

File Name: 3ctftpsvc_mode_overflow.nasl

Version: $Revision: 1.21 $

Type: remote

Agent: windows

Family: Windows

Published: 2006/11/28

Modified: 2014/05/25

Dependencies: 11819

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:3com:3ctftpsvc

Required KB Items: Services/udp/tftp, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/11/26

Exploitable With


Core Impact

Metasploit (3CTftpSvc TFTP Long Mode Buffer Overflow)

Reference Information

CVE: CVE-2006-6183

BID: 21301, 21322

OSVDB: 30758