Vulnerabilities > CVE-2006-0328 - Remote Format String vulnerability in Philippe Jounin Tftpd32 2.81

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
philippe-jounin
nessus
exploit available

Summary

Format string vulnerability in Tftpd32 2.81 allows remote attackers to cause a denial of service via format string specifiers in a filename in a (1) GET or (2) SEND request.

Vulnerable Configurations

Part Description Count
Application
Philippe_Jounin
1

Exploit-Db

descriptionTftpd32 2.81 (GET Request) Format String Denial of Service PoC. CVE-2006-0328. Dos exploit for windows platform
idEDB-ID:1424
last seen2016-01-31
modified2006-01-19
published2006-01-19
reporterCritical Security
sourcehttps://www.exploit-db.com/download/1424/
titleTftpd32 2.81 - GET Request Format String Denial of Service PoC

Nessus

NASL familyGain a shell remotely
NASL idTFTPD32_FORMAT_STRING.NASL
descriptionThe remote host appears to be running Tftpd32, a tftpd server for Windows. There is a format string vulnerability in versions of Tftpd32 up to and including 2.81 that may allow remote attackers to crash the server or to execute code on the affected host subject to the privileges under which the server operates, possibly SYSTEM since the application can be configured to run as a service.
last seen2020-06-01
modified2020-06-02
plugin id20755
published2006-01-20
reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20755
titleTftpd32 Error Message Format String