Korean
<< Back
VID 12078
Severity 40
Port 69
Protocol UDP
Class TFTP
Detailed Description The TFTP server is vulnerable to a denial service attack via an overly long file name. Trivial File Transfer Protocol (TFTP) is a protocol that allows for easy transfer of files without requiring authentication between network-connected devices. Some TFTP servers are vulnerable to a denial of service attack, caused by a buffer overflow. By sending a Read Request (RRQ) containing a file name of 1000 or more characters to the TFTP server, a remote attacker could cause the affected server to crash.

* References:
http://archives.neohapsis.com/archives/bugtraq/2002-07/0352.html
http://archives.neohapsis.com/archives/bugtraq/2003-06/0056.html
http://archives.neohapsis.com/archives/bugtraq/2003-06/0032.html
http://www.debian.org/security/2003/dsa-314
http://www.linuxsecurity.com/content/view/105077/104/
http://www.securiteam.com/exploits/5ZP0E0AAAU.html
http://www.cisco.com/warp/public/707/ios-tftp-long-filename-pub.shtml
http://www.phenoelit.de/stuff/Cisco_tftp.txt

* Platforms Affected:
Any TFTP server Any version
Any operating system Any version
Recommendation Consider disabling the affected TFTP server if it is not required. Otherwise contact your vendor for upgrade or patch information.
Related URL CVE-2002-0813,CVE-2003-0380 (CVE)
Related URL 401,5328,7819 (SecurityFocus)
Related URL 9700,12192 (ISS)