Korean
<< Back
VID 16108
Severity 40
Port 69
Protocol UDP
Class TFTP
Detailed Description The TFTP server is vulnerable to a directory traversal vulnerability. Trivial File Transfer Protocol (TFTP) allows remote users to copy, read, or write to files without requiring authentication. TFTP is sometimes legitimately used for bootstrapping by diskless workstations. The affected TFTP server could allow a remote unauthorized attacker to retrieve directories and access arbitrary files on the host.

* References:
http://www.cert.org/advisories/CA-1991-18.html

* Platforms Affected:
TFTP Any version
Any operating system Any version
Recommendation If it is not required, disable the affected TFTP service.

-- OR --

Install a more recent version of the daemon and make sure that its home directory should be restricted to a specific directory such as the followings:

For ULTRIX:
tftp dgram udp nowait /etc/tftpd tftpd -r /tftpboot

For Sun Solaris:
tftp dgram udp wait root /usr/etc/in.tftpd in.tftpd -s /tftpboot
Related URL CVE-1999-0498 (CVE)
Related URL 6198,11584 (SecurityFocus)
Related URL (ISS)