Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

TFTP:TRANSPORT-BOF

Severity

Medium

Recommended

Yes

Recommended Action

Drop

Category

TFTP

Keywords

Multiple Vendors TFTP Transporting Mode Remote Buffer Overflow Vulnerability

Release Date

2008/03/19

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

TFTP: Multiple Vendors TFTP Transporting Mode Remote Buffer Overflow Vulnerability


This signature detects attempts to exploit a known buffer-overflow vulnerability against TFTPUtil GUI and 3COM TFTP server, a trivial file transfer protocol (TFTP) program. A successful attack allows an attacker to corrupt and overwrite memory and gain control of the affected application. An unsuccessful attack, can result in a denial-of-service condition.

Extended Description

3Com TFTP is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before storing it in a finite-sized buffer. An attacker can exploit this issue to cause the application to crash, denying further service to legitimate users. Due to the nature of this issue, the attacker may presumably be able to exploit it for remote code execution. Version 2.0.1 is vulnerable; other versions may also be affected.

Affected Products

  • 3Com TFTP Server 2.0.1

References

  • BugTraq: 21322
  • BugTraq: 21301
  • BugTraq: 39872
  • CVE: CVE-2006-6183
  • URL: https://alerts.symantec.com/loaddocument.aspx?GUID=4a3ebe08-c393-48c0-811a-de07812cb544
  • URL: http://downloads.securityfocus.com/vulnerabilities/exploits/21301-UW.pl

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out