SlideShare a Scribd company logo
1 of 3
Download to read offline
Symantec Vulnerability Alert
  TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability
         Synopsis
  Bugtraq ID    39872                                                          Urgency Rating 7.9
 CVE            CVE-MAP-NOMATCH
                                                                               Threat Breakdown
 Published      May 02 2010
                                                                                  Severity             8.9
 Classification Boundary Condition Error
 Remote         Yes                     Local          No                         Impact               8

 Availability   Always                  Authentication Not Required               Ease of Exploit 8
 Ease           Exploit Available                                                 Credibility          Single Source
 Last Update    05/03/2010 8:04:07 PM GMT
 Last Change    Initial analysis.                                               CVSS Version 2
 CVSS Version 2                                                                 CVSS2 Base               7.5
 CVSS2 Base         7.5   CVSS2 Base         AV:N/AC:L/Au:N/C:P/I:P/A:P
                          Vector                                                CVSS2 Temporal 6.4
 CVSS2              6.4   CVSS2           E:F/RL:U/RC:UC
 Temporal                 Temporal Vector
 CVSS Version 1
 CVSS1 Base         7     CVSS1              6
                          Temporal


Vulnerable Systems
   TFTPGUI TFTPGUI 1.4.5

Short Summary

   TFTPUtil GUI is prone to a buffer-overflow vulnerability.


Impact

   An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit
   attempts will result in a denial-of-service condition.


Technical Description

   TFTPUtil GUI is a trivial file transfer protocol (TFTP) program for Windows platforms.

   The application is prone to a buffer-overflow vulnerability because it fails to properly validate an overly long transport
   mode string. Attackers can leverage this issue to corrupt and overwrite memory. This may allow them to change the flow
   of execution and gain control of the affected application.

   An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit
   attempts will result in a denial-of-service condition.
  TFTPUtilGUI 1.4.5 is vulnerable; other versions may also be affected.
   TFTPUtil
            GUI Long Transport Mode Buffer Overflow Vulnerability


                                                                                                Create Date 5/3/2010 8:07:08 PM GMT
attempts will result in a denial-of-service condition.

   TFTPUtil GUI 1.4.5 is vulnerable; other versions may also be affected.


Attack Scenarios

   1. An attacker locates a remotely accessible vulnerable server.

   2. The attacker sends a malicious request to the TFTP service. The request will contain excessive data, memory
   addresses, machine code, and possibly NOP instructions.

   3. When the vulnerable application processes the request, a buffer overflows and the attacker-supplied code runs in the
   context of the affected application.


Exploits
   The following proof of concept is available:
   Jeremiah Talamantes 2010-05-02 00:00:00Z
   http://downloads.securityfocus.com/vulnerabilities/exploits/39872.py

Mitigating Strategies
   Deploy network intrusion detection systems to monitor network traffic for malicious activity.
      Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit this and
      similar vulnerabilities. Audit all applicable logs regularly.

   Do not follow links provided by unknown or untrusted sources.
      To reduce the likelihood of successful exploits, never visit sites of questionable integrity or follow links provided by
      unfamiliar or untrusted sources.

   Implement multiple redundant layers of security.
       Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder
       an attacker's ability to exploit this vulnerability to execute arbitrary code.

   Block sites at border that are against policy.
       Block external access at the network boundary, unless external parties require service.


Solutions
   Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent
   information, please mail us at: vuldb@securityfocus.com.


Credit

   Jeremiah Talamantes


References
   Web Page:TFTPGUI Homepage TFTPGUI
      http://sourceforge.net/projects/tftputil




  TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability


                                                                                             Create Date 5/3/2010 8:07:08 PM GMT
Change Log
   2010.05.03: Initial analysis.

URL

   https://alerts.symantec.com/loaddocument.aspx?GUID=44d1bb0e-e78e-4aa4-9f22-a48ad289e5d8




  TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability


                                                                               Create Date 5/3/2010 8:07:08 PM GMT

More Related Content

Viewers also liked

The HR Revista 2nd Issue - Survival of the Fittest
The HR Revista 2nd Issue - Survival of the FittestThe HR Revista 2nd Issue - Survival of the Fittest
The HR Revista 2nd Issue - Survival of the FittestChintan Trivedi
 
The HR Revista 3rd issue - Womens' Standing in HR Profession
The HR Revista 3rd issue  - Womens' Standing in HR ProfessionThe HR Revista 3rd issue  - Womens' Standing in HR Profession
The HR Revista 3rd issue - Womens' Standing in HR ProfessionChintan Trivedi
 
The HR Revista 1st issue - Talent Economics
The HR Revista   1st issue - Talent EconomicsThe HR Revista   1st issue - Talent Economics
The HR Revista 1st issue - Talent EconomicsChintan Trivedi
 
HR Revista 4th edition - Best People Practices
HR Revista 4th edition - Best People PracticesHR Revista 4th edition - Best People Practices
HR Revista 4th edition - Best People PracticesChintan Trivedi
 
Curious Trends: The Food Industry 2015
Curious Trends: The Food Industry 2015Curious Trends: The Food Industry 2015
Curious Trends: The Food Industry 2015Jeff Jones
 
The HR Revista 5th issue - Appraisal
The HR Revista   5th issue  - AppraisalThe HR Revista   5th issue  - Appraisal
The HR Revista 5th issue - AppraisalChintan Trivedi
 

Viewers also liked (8)

The HR Revista 2nd Issue - Survival of the Fittest
The HR Revista 2nd Issue - Survival of the FittestThe HR Revista 2nd Issue - Survival of the Fittest
The HR Revista 2nd Issue - Survival of the Fittest
 
The HR Revista 3rd issue - Womens' Standing in HR Profession
The HR Revista 3rd issue  - Womens' Standing in HR ProfessionThe HR Revista 3rd issue  - Womens' Standing in HR Profession
The HR Revista 3rd issue - Womens' Standing in HR Profession
 
The HR Revista 1st issue - Talent Economics
The HR Revista   1st issue - Talent EconomicsThe HR Revista   1st issue - Talent Economics
The HR Revista 1st issue - Talent Economics
 
Hệ ThốNg Cip Trong Nhà MáY SữA
Hệ ThốNg Cip Trong Nhà MáY SữAHệ ThốNg Cip Trong Nhà MáY SữA
Hệ ThốNg Cip Trong Nhà MáY SữA
 
HR Revista 4th edition - Best People Practices
HR Revista 4th edition - Best People PracticesHR Revista 4th edition - Best People Practices
HR Revista 4th edition - Best People Practices
 
Comunicazione visiva
Comunicazione visivaComunicazione visiva
Comunicazione visiva
 
Curious Trends: The Food Industry 2015
Curious Trends: The Food Industry 2015Curious Trends: The Food Industry 2015
Curious Trends: The Food Industry 2015
 
The HR Revista 5th issue - Appraisal
The HR Revista   5th issue  - AppraisalThe HR Revista   5th issue  - Appraisal
The HR Revista 5th issue - Appraisal
 

A Vulnerability I Discovered in TFTPGui

  • 1. Symantec Vulnerability Alert TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability Synopsis Bugtraq ID 39872 Urgency Rating 7.9 CVE CVE-MAP-NOMATCH Threat Breakdown Published May 02 2010 Severity 8.9 Classification Boundary Condition Error Remote Yes Local No Impact 8 Availability Always Authentication Not Required Ease of Exploit 8 Ease Exploit Available Credibility Single Source Last Update 05/03/2010 8:04:07 PM GMT Last Change Initial analysis. CVSS Version 2 CVSS Version 2 CVSS2 Base 7.5 CVSS2 Base 7.5 CVSS2 Base AV:N/AC:L/Au:N/C:P/I:P/A:P Vector CVSS2 Temporal 6.4 CVSS2 6.4 CVSS2 E:F/RL:U/RC:UC Temporal Temporal Vector CVSS Version 1 CVSS1 Base 7 CVSS1 6 Temporal Vulnerable Systems TFTPGUI TFTPGUI 1.4.5 Short Summary TFTPUtil GUI is prone to a buffer-overflow vulnerability. Impact An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Technical Description TFTPUtil GUI is a trivial file transfer protocol (TFTP) program for Windows platforms. The application is prone to a buffer-overflow vulnerability because it fails to properly validate an overly long transport mode string. Attackers can leverage this issue to corrupt and overwrite memory. This may allow them to change the flow of execution and gain control of the affected application. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. TFTPUtilGUI 1.4.5 is vulnerable; other versions may also be affected. TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability Create Date 5/3/2010 8:07:08 PM GMT
  • 2. attempts will result in a denial-of-service condition. TFTPUtil GUI 1.4.5 is vulnerable; other versions may also be affected. Attack Scenarios 1. An attacker locates a remotely accessible vulnerable server. 2. The attacker sends a malicious request to the TFTP service. The request will contain excessive data, memory addresses, machine code, and possibly NOP instructions. 3. When the vulnerable application processes the request, a buffer overflows and the attacker-supplied code runs in the context of the affected application. Exploits The following proof of concept is available: Jeremiah Talamantes 2010-05-02 00:00:00Z http://downloads.securityfocus.com/vulnerabilities/exploits/39872.py Mitigating Strategies Deploy network intrusion detection systems to monitor network traffic for malicious activity. Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit this and similar vulnerabilities. Audit all applicable logs regularly. Do not follow links provided by unknown or untrusted sources. To reduce the likelihood of successful exploits, never visit sites of questionable integrity or follow links provided by unfamiliar or untrusted sources. Implement multiple redundant layers of security. Various memory-protection schemes (such as nonexecutable and randomly mapped memory segments) may hinder an attacker's ability to exploit this vulnerability to execute arbitrary code. Block sites at border that are against policy. Block external access at the network boundary, unless external parties require service. Solutions Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com. Credit Jeremiah Talamantes References Web Page:TFTPGUI Homepage TFTPGUI http://sourceforge.net/projects/tftputil TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability Create Date 5/3/2010 8:07:08 PM GMT
  • 3. Change Log 2010.05.03: Initial analysis. URL https://alerts.symantec.com/loaddocument.aspx?GUID=44d1bb0e-e78e-4aa4-9f22-a48ad289e5d8 TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability Create Date 5/3/2010 8:07:08 PM GMT