vendor:
AT-TFTP Server
by:
xis_one@STM Solutions
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: AT-TFTP Server
Affected Version From: 2.0
Affected Version To: 2.0
Patch Exists: YES
Related CWE: N/A
CPE: a:allied_telesis:at-tftp_server:2.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2013
AT-TFTP 2.0 long filename stack based buffer overflow – DOS
AT-TFTP 2.0 is vulnerable to a stack based buffer overflow vulnerability. The vulnerability is triggered when a maliciously crafted packet is sent to the server. This can lead to a denial of service (DoS) condition. The vulnerability was discovered in 2006 by liuqx@nipc.org.cn and is still present in version 2.0. The exploit can be triggered remotely and has been tested on Windows XP SP3.
Mitigation:
Upgrade to the latest version of AT-TFTP 2.0 or apply the patch provided by the vendor.