10
CVSSv2

CVE-2008-1611

Published: 01/04/2008 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in TFTP Server SP 1.4 for Windows allows remote malicious users to cause a denial of service or execute arbitrary code via a long filename in a read or write request.

Vulnerable Product Search on Vulmon Subscribe to Product

tftp-server winagents tftp server sp_1.4

Exploits

#!/usr/bin/python #---------------------------------------------------------------------------# # Exploit: TFTP SERVER V14 ST (RRQ Overflow) # # OS: Windows XP PRO SP3 # # Author: b33f # #------------------ ...
#!/usr/bin/python # TFTP Server for Windows V14 ST (0day) # sourceforgenet/projects/tftp-server/ # Tested on Windows Vista SP0 # Coded by Mati Aharoni # mutsatoffensive-securitycom # wwwoffensive-securitycom/0day/sourceforge-tftpdpytxt ################################################################## # bt ~ # sourceforge- ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking inc ...