Vulnerabilities > CVE-2006-0328 - Unspecified vulnerability in Philippe Jounin Tftpd32 2.81

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
philippe-jounin
nessus
exploit available

Summary

Format string vulnerability in Tftpd32 2.81 allows remote attackers to cause a denial of service via format string specifiers in a filename in a (1) GET or (2) SEND request.

Vulnerable Configurations

Part Description Count
Application
Philippe_Jounin
1

Exploit-Db

descriptionTftpd32 2.81 (GET Request) Format String Denial of Service PoC. CVE-2006-0328. Dos exploit for windows platform
idEDB-ID:1424
last seen2016-01-31
modified2006-01-19
published2006-01-19
reporterCritical Security
sourcehttps://www.exploit-db.com/download/1424/
titleTftpd32 2.81 - GET Request Format String Denial of Service PoC

Nessus

NASL familyGain a shell remotely
NASL idTFTPD32_FORMAT_STRING.NASL
descriptionThe remote host appears to be running Tftpd32, a tftpd server for Windows. There is a format string vulnerability in versions of Tftpd32 up to and including 2.81 that may allow remote attackers to crash the server or to execute code on the affected host subject to the privileges under which the server operates, possibly SYSTEM since the application can be configured to run as a service.
last seen2020-06-01
modified2020-06-02
plugin id20755
published2006-01-20
reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20755
titleTftpd32 Error Message Format String