ID CVE-2006-6184
Summary Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
References
Vulnerable Configurations
  • cpe:2.3:a:alliedtelesyn:at-tftp:-:*:*:*:*:*:*:*
    cpe:2.3:a:alliedtelesyn:at-tftp:-:*:*:*:*:*:*:*
  • cpe:2.3:a:alliedtelesyn:at-tftp:1.9:*:*:*:*:*:*:*
    cpe:2.3:a:alliedtelesyn:at-tftp:1.9:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 17-10-2018 - 21:47)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 21320
bugtraq 20061126 TFTP Server AT-TFTP Server v 1.9 Buffer Overflow Vulnerability (Long filename)
exploit-db
  • 16350
  • 24952
osvdb 11350
secunia 23106
sreason
  • 1929
  • 8120
vupen ADV-2006-4737
xf attftp-filename-bo(30539)
statements via4
contributor Sheldon Duthie
lastmodified 2007-04-17
organization Allied Telesyn
statement More recent revision AT-TFTPD Server 2.0 does not suffer the listed vulnerability. Only the more recent revision AT-TFTPD Server 2.0 can be found for download from our website, currently via the following link: http://www.alliedtelesis.com/support/software/default.aspx?cid=1&pid=182
Last major update 17-10-2018 - 21:47
Published 01-12-2006 - 00:28
Last modified 17-10-2018 - 21:47
Back to Top