Vulnerabilities > CVE-2006-6184 - Unspecified vulnerability in Alliedtelesyn At-Tftp 1.9
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description TFTP Daemon v1.9 Denial of Service Exploit. CVE-2006-6184. Dos exploit for windows platform id EDB-ID:10603 last seen 2016-02-01 modified 2009-12-22 published 2009-12-22 reporter Socket_0x03 source https://www.exploit-db.com/download/10603/ title TFTP Daemon 1.9 - Denial of Service Exploit description AT-TFTP Server 2.0 - Stack Based Buffer Overflow DoS. CVE-2006-6184. Dos exploit for windows platform file exploits/windows/dos/24952.py id EDB-ID:24952 last seen 2016-02-03 modified 2013-04-12 platform windows port 69 published 2013-04-12 reporter xis_one source https://www.exploit-db.com/download/24952/ title AT-TFTP Server 2.0 - Stack Based Buffer Overflow DoS type dos description Allied Telesyn TFTP Server 1.9 Long Filename Overflow. CVE-2006-6184. Remote exploit for windows platform file exploits/windows/remote/16350.rb id EDB-ID:16350 last seen 2016-02-01 modified 2011-03-05 platform windows port published 2011-03-05 reporter metasploit source https://www.exploit-db.com/download/16350/ title Allied Telesyn TFTP Server 1.9 - Long Filename Overflow type remote
Metasploit
description | This module exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name. |
id | MSF:EXPLOIT/WINDOWS/TFTP/ATTFTP_LONG_FILENAME |
last seen | 2020-04-11 |
modified | 2017-11-08 |
published | 2007-09-09 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6184 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/tftp/attftp_long_filename.rb |
title | Allied Telesyn TFTP Server 1.9 Long Filename Overflow |
Nessus
NASL family | Gain a shell remotely |
NASL id | AT_TFTPD_LONG_FILENAME_OVERFLOW.NASL |
description | The remote host appears to be running AT-TFTP Server, a tftpd server for Windows. The version of AT-TFTP Server installed on the remote host appears to be affected by a buffer overflow vulnerability involving a long filenames when getting or putting files. By leveraging this flaw, a remote attacker may be able to crash the remote service or to execute code on the affected host subject to the privileges under which the server operates. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 23736 |
published | 2006-11-28 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/23736 |
title | AT-TFTP Server Filename Handling Remote Overflow |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83147/attftp_long_filename.rb.txt |
id | PACKETSTORM:83147 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | Patrick Webster |
source | https://packetstormsecurity.com/files/83147/Allied-Telesyn-TFTP-Server-1.9-Long-Filename-Overflow.html |
title | Allied Telesyn TFTP Server 1.9 Long Filename Overflow |
Statements
contributor | Sheldon Duthie |
lastmodified | 2007-04-17 |
organization | Allied Telesyn |
statement | More recent revision AT-TFTPD Server 2.0 does not suffer the listed vulnerability. Only the more recent revision AT-TFTPD Server 2.0 can be found for download from our website, currently via the following link: http://www.alliedtelesis.com/support/software/default.aspx?cid=1&pid=182 |
References
- http://secunia.com/advisories/23106
- http://secunia.com/advisories/23106
- http://securityreason.com/securityalert/1929
- http://securityreason.com/securityalert/1929
- http://securityreason.com/securityalert/8120
- http://securityreason.com/securityalert/8120
- http://www.exploit-db.com/exploits/16350
- http://www.exploit-db.com/exploits/16350
- http://www.exploit-db.com/exploits/24952
- http://www.exploit-db.com/exploits/24952
- http://www.osvdb.org/11350
- http://www.osvdb.org/11350
- http://www.securityfocus.com/archive/1/452743/100/0/threaded
- http://www.securityfocus.com/archive/1/452743/100/0/threaded
- http://www.securityfocus.com/bid/21320
- http://www.securityfocus.com/bid/21320
- http://www.vupen.com/english/advisories/2006/4737
- http://www.vupen.com/english/advisories/2006/4737
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30539
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30539