exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

idefense.solarwinds.txt

idefense.solarwinds.txt
Posted Oct 25, 2002
Authored by David Endler, Matthew Murphy | Site idefense.com

iDEFENSE Security Advisory 10.24.02 - The Solarwinds TFTP server v5.0.55 and below contains a directory traversal bug which allows remote users to download any file on the system.

tags | remote
SHA-256 | a7a4ff629f7e930a627e2df7c2e09b6d40a316d099e31b0a622bdad02850eb20

idefense.solarwinds.txt

Change Mirror Download
iDEFENSE Security Advisory 10.24.02: http://www.idefense.com/advisory/10.24.02.txt
Directory Traversal in SolarWinds TFTP Server
October 24, 2002

I. BACKGROUND

The SolarWinds TFTP Server has the ability to send and receive
multiple files concurrently. This TFTP Server is commonly used to
upload/download executable images and configurations to routers,
switches, hubs, XTerminals, etc. The software is freely available
from http://support.solarwinds.net/updates/New-customerFree.cfm and
also included in the Standard, Professional, and Professional PLus
Editions of SolarWinds Network Management Tools.

II. DESCRIPTION

SolarWinds.net's TFTP Server is susceptible to a folder traversal
attack allowing attackers to retrieve any file from the application.
This vulnerability is often found due to a common programming error
in the handling of file paths. The process is best explained with an
example:

tftp target.server GET a\..\..\winnt\repair\sam

The above example will retrieve the Windows NT SAM file from the
target server as the file request is translated to:

C:\TFTP-ROOT\a\..\..\winnt\repair\sam

Where TFTP-ROOT is the default installed root directory.

III. ANALYSIS

Successful exploitation of this vulnerability provides attackers with
access to any file on the target system. It is possible for this
attack to lead to further compromise if for example the Windows NT
SAM file was retrieved. SolarWinds TFTP Server is a free,
multi-threaded TFTP server with security. More information about this
application can be found at
http://www.solarwinds.net/Tools/Free_tools/TFTP_Server/.

IV. DETECTION

iDEFENSE has verified the existence of this vulnerability in the
latest version of SolarWinds TFTP Server (v5.0.55). It is suspected
that earlier versions are vulnerable as well. A specific
implementation's susceptibility can be determined by experimenting
with the above-described specifics.

V. WORKAROUND

It is suggested that file transmittals be disabled if they are not
required. This can be accomplished by selecting the "Receive only"
radio button under the "File\Configure\Security" tab of the
application. A firewall that restricts access to the application to
only trusted sources could also help mitigate the attack.

Additionally, version 5.0.60 or later of the SolarWinds TFTP Server
does not have this vulnerability.

VI. VENDOR FIX/RESPONSE

This problem has been resolved in all versions of the SolarWinds TFTP
Server that are version 5.0.60 or later. Updated versions of all
SolarWinds Tools are now available from http://www.solarwinds.net

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
has assigned the identification number CAN-2002-1209 to
this issue.

VIII. DISCLOSURE TIMELINE

09/22/2002 Issue disclosed to iDEFENSE
10/14/2002 Solarwinds.net notified
10/14/2002 iDEFENSE clients notified
10/14/2002 Response received from Josh Stevens (josh@solarwinds.net)
10/14/2002 Vendor fix made available
10/24/2002 Coordinated public disclosure

IX. CREDIT

Matthew Murphy (mattmurphy@kc.rr.com) is credited with discovering
this vulnerability.
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close