|
Family: Gain a shell remotely --> Category: denial
Tftpd32 Format String Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for a format string vulnerability in Tftpd32
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote tftp server is affected by a format string vulnerability.
Description :
The remote host appears to be running Tftpd32, a tftpd server for
Windows.
There is a format string vulnerability in versions of Tftpd32 up to
and including 2.81 that may allow remote attackers to crash the server
or to execute code on the affected host subject to the rights
under which the server operates, possibly SYSTEM since the application
can be configured to run as a service.
See also :
http://www.critical.lt/?vulnerabilities/200
http://www.securityfocus.com/archive/1/422405/30/0/threaded
Solution :
Unknown at this time.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:N/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|