lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 11 May 2007 15:38:33 -0000
From: VulnerabilityResearch@...italdefense.net
To: bugtraq@...urityfocus.com
Subject: TFTPdWin 0.4.2 Server Directory Traversal Vulnerability

Title
-----
TFTPdWin 0.4.2 Server Directory Traversal Vulnerability

Severity
--------
High

Date Discovered
---------------
3/15/2007

Vendor Notified
---------------
3/26/2007  -  No Response

Discovered By
-------------
Digital Defense, Inc. Vulnerability Research Team
 - r@...s

Vulnerability Description
-------------------------
The version of TFTPdWin contains a vulnerability that allows a potential intruder to gain read and write access to directories and files outside of the TFTP root.  Successful exploitation of this vulnerability may also allow a remote, unauthenticated attacker to overwrite and modify system files which could facilitate the execution of arbitrary code, the result of which could ultimately lead to a full system compromise.  

Solution Description
--------------------
No patch is available at this time.  Other versions may be vulnerable.


Tested Systems / Software (with versions)
-----------------------------------------
Windows XP Professional Service Pack 2, TFTPdWin version 0.4.2

Vendor Website
--------------
http://www.prosysinfo.webpark.pl/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ