TFTPD32 is susceptible to a remote denial of service attack.
08d63438b5eeee5c70a2de34a5848af21d0b764e94caf2d59984c64995ca09c9
TFTPD32 Long FileName Remote Denial of Service
By Sowhat
12.JAN.2005
http://secway.org/advisory/ad20050108.txt
Product Affected:
TFTPD 2.74 and prior
Impact:
Low
(1) Introduction
TFTPD32 is a bundle including a full featured TFTP server, a TFTP
client, a DHCP server and a Syslog server.
TFTPD32 is designed for Windows 95/NT/2000/XP.
"TFTPD32 recommended by Cisco, HP and other companies" --From the
author's webpage.
For more information:
http://perso.wanadoo.fr/philippe.jounin/TFTPD32.html
(2) Details
A vulnerability in TFTPD32 may allow remote attackers crash the
TFTPD32 and therefore cause a Denial of Service.
aviram(@)beyondsecurity.com had reported "TFTPD32 Buffer Overflow
Vulnerability (Long filename)" to bugtraq. And it seems that the
author fixed the problem in v2.51.
But during a simple audit,I found that TFTPD32 is still vulnerable to
"Long Filenmae".
C:\Windows\System32>tftp -i 192.168.0.1 get AAAAA...[about 508 'A' here]...AA
The TFTPD32 will print the following error messages 2 times:
"Error:RecvFrom Returns 10040 <"A message sent on a datagram socket
was larger than the internal message buffer or some other network
limit, or the buffer used to receive a datagram into was smaller than
the datagram itself.">"
and then it will dead.
But this vulnerability seems very unstable and not exploitable.
the TFTPD32 will not dead immediately ,usually 10-15 seconds after the
request,and some times you need to "get" 2-3 times.
(3) Solution
Waitting for the author's update
(4) Author Response
I have sent an email to the author BUT no reply yet.