ID

VAR-E-201011-1068


TITLE

RETIRED: AT-TFTP Server Directory Traversal Vulnerability

Trust: 0.3

sources: BID: 44711

DESCRIPTION

AT-TFTP Server is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue can allow an attacker to retrieve arbitrary files outside of the FTP server root directory. This may aid in further attacks.
AT-TFTP Server 1.8 is vulnerable; other versions may also be affected.
RETIRED: This issue is retired because it is a duplicate of BID 11584.

Trust: 0.3

sources: BID: 44711

AFFECTED PRODUCTS

vendor:alliedmodel:telesis at-tftp serverscope:eqversion:1.8

Trust: 0.3

sources: BID: 44711

EXPLOIT

Attackers can exploit this issue using readily available tools.
The following example request is available:
GET ../../../boot.ini C:\boot.txt

Trust: 0.3

sources: BID: 44711

PRICE

Free

Trust: 0.3

sources: BID: 44711

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 44711

CREDITS

Pr0T3cT10n

Trust: 0.3

sources: BID: 44711

EXTERNAL IDS

db:BIDid:44711

Trust: 0.3

sources: BID: 44711

REFERENCES

url:http://www.alliedtelesis.co.nz/support/rapier/downloads/at-tftpd.exe

Trust: 0.3

sources: BID: 44711

SOURCES

db:BIDid:44711

LAST UPDATE DATE

2022-07-27T09:54:47.216000+00:00


SOURCES UPDATE DATE

db:BIDid:44711date:2010-11-17T17:06:00

SOURCES RELEASE DATE

db:BIDid:44711date:2010-11-06T00:00:00