Exploit the possiblities

Tftpd32 Client Side Format String

Tftpd32 Client Side Format String
Posted Dec 3, 2013
Authored by Fara Denise Rustein

There is a format string vulnerability in Tftpd32 software. When the Tftpd server returns a string containing a specific format, the Tftpd32 client processes this string and displays it in an error message, triggering the vulnerability. This may be leveraged to perform remote command execution and denial of service attacks.

tags | exploit, remote, denial of service
advisories | CVE-2013-6809
MD5 | ec6484546c5786b9b87fa7f6140cb351

Tftpd32 Client Side Format String

Change Mirror Download
"Tftpd32 Client Side Format String Vulnerability"

- CVE: CVE-2013-6809
- For reference:
  + "CWE-134: Uncontrolled Format String" - http://cwe.mitre.org/data/definitions/134.html
  + "CAPEC-135: Format String Injection" - http://capec.mitre.org/data/definitions/135.html

- Affected Vendor: Tftpd32
- Affected System: Tftpd32 v4.00 Build May
- Vendor Disclosure Date: November 16th, 2013
- Public Disclosure Date: December, 1st, 2013
- Vulnerability Status: Fixed

- Description: There is a format string vulnerability on the Tftpd32 software. When the Tftpd server returns a string containing a specific format, the Tftpd32 client processes this string and displays it in an error message, triggering the vulnerability. This may be leveraged to perform remote command execution and denial of service attacks.
- PoC (1):
  +  The format string used in the "Remote File" field is: %p%p%p%p
  +  The error message displays the processed string: 771C2D8B7672655373207265737706F74
- PoC (2):
  +  The format string used in the "Remote File" field is: %2525wi
  +  Observe that the application crashes.

- Fix: v4.50 release - (http://tftpd32.jounin.net/tftpd32_download.html)
  + http://tftpd32.jounin.net/download/tftpd32.450.zip
  + http://tftpd32.jounin.net/download/Tftpd32-4.50-setup.exe
  + http://tftpd32.jounin.net/download/Tftpd32_SE-4.50-setup.exe
  + http://tftpd32.jounin.net/download/tftpd64.450.zip
  + http://tftpd32.jounin.net/download/Tftpd64-4.50-setup.exe
  + http://tftpd32.jounin.net/download/Tftpd64_SE-4.50-setup.exe
  + http://tftpd32.jounin.net/download/tftpd32-sources.450.zip

- Related Links: Deloitte Argentina - www.deloitte.com/ar
- Credits: This vulnerability was found by Fara Rustein from Deloitte Argentina (https://twitter.com/FaraRustein).
- Feedback: If you have any questions, comments, concerns, updates or suggestions please feel free to send them to: frustein@deloitte.com

Fara Rustein | Senior Consultant
Cyber Security - Deloitte
The key is searching. Vs nfv zphz qsui ghzf zg xhv yvzqy gj tiwap.

 
Deloitte se refiere a una o más de las firmas miembros de Deloitte Touche Tohmatsu Limited, una compañía privada del Reino Unido limitada por garantía, y su red de firmas miembros, cada una como una entidad única e independiente y legalmente separada. Una descripción detallada de la estructura legal de Deloitte Touche Tohmatsu Limited y sus firmas miembros puede verse en el sitio web http://www.deloitte.com/about.                           La información de este mail es confidencial y concierne únicamente a la persona a quien está dirigida. Si este mensaje no está dirigido a usted, por favor tenga presente que no tiene autorización para leer el resto de este e-mail, copiarlo o derivarlo a cualquier otra persona que no sea aquella a quien está dirigido. Si recibe este mail por error, por favor, avise al remitente, luego de lo cual rogamos a usted destruya el mensaje original. No se puede responsabilizar de ningún modo a Deloitte & Co. S.A. ni a sus subsidiarias por cualquier consecuencia o daño que pueda resultar del apropiado y completo envío y recepción del contenido de este e-mail.
 
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see http://www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. 
The information in this e-mail is confidential and intended solely for the person to whom it is addressed. If this message is not addressed to you, please be aware that you have no authorization to read the rest of this e-mail, to copy it or to furnish it to any person other than the addressee. Should you have received this e-mail by mistake, please bring this to the attention of the sender, after which you are kindly requested to destroy the original message. Deloitte & Co. S.A. and subsidiaries cannot be held responsible or liable in any way whatsoever for and/or in connection with any consequences and/or damage resulting from the proper and complete dispatch and receipt of the content of this e-mail.


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close