VID |
12078 |
Severity |
40 |
Port |
69 |
Protocol |
UDP |
Class |
TFTP |
Detailed Description |
The TFTP server is vulnerable to a denial service attack via an overly long file name. Trivial File Transfer Protocol (TFTP) is a protocol that allows for easy transfer of files without requiring authentication between network-connected devices. Some TFTP servers are vulnerable to a denial of service attack, caused by a buffer overflow. By sending a Read Request (RRQ) containing a file name of 1000 or more characters to the TFTP server, a remote attacker could cause the affected server to crash.
* References: http://archives.neohapsis.com/archives/bugtraq/2002-07/0352.html http://archives.neohapsis.com/archives/bugtraq/2003-06/0056.html http://archives.neohapsis.com/archives/bugtraq/2003-06/0032.html http://www.debian.org/security/2003/dsa-314 http://www.linuxsecurity.com/content/view/105077/104/ http://www.securiteam.com/exploits/5ZP0E0AAAU.html http://www.cisco.com/warp/public/707/ios-tftp-long-filename-pub.shtml http://www.phenoelit.de/stuff/Cisco_tftp.txt
* Platforms Affected: Any TFTP server Any version Any operating system Any version |
Recommendation |
Consider disabling the affected TFTP server if it is not required. Otherwise contact your vendor for upgrade or patch information. |
Related URL |
CVE-2002-0813,CVE-2003-0380 (CVE) |
Related URL |
401,5328,7819 (SecurityFocus) |
Related URL |
9700,12192 (ISS) |
|