AT-TFTP Server Filename Handling Remote Overflow

Critical Nessus Plugin ID 23736


The remote tftp server is affected by a buffer overflow vulnerability.


The remote host appears to be running AT-TFTP Server, a tftpd server for Windows.

The version of AT-TFTP Server installed on the remote host appears to be affected by a buffer overflow vulnerability involving a long filenames when getting or putting files. By leveraging this flaw, a remote attacker may be able to crash the remote service or to execute code on the affected host subject to the privileges under which the server operates.


Unknown at this time.

See Also

Plugin Details

Severity: Critical

ID: 23736

File Name: at_tftpd_long_filename_overflow.nasl

Version: $Revision: 1.14 $

Type: remote

Published: 2006/11/28

Modified: 2011/03/16

Dependencies: 11819

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: Services/udp/tftp, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2006/11/26

Exploitable With

Core Impact

Metasploit (Allied Telesyn TFTP Server 1.9 Long Filename Overflow)

Reference Information

CVE: CVE-2006-6184

BID: 21320

OSVDB: 30756