Executive Summary

Summary
Title Serva32 2.1.0 TFTPD service buffer overflow vulnerability
Informations
Name VU#127108 First vendor Publication 2013-05-14
Vendor VU-CERT Last vendor Modification 2013-05-21
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#127108

Serva32 2.1.0 TFTPD service buffer overflow vulnerability

Original Release date: 14 May 2013 | Last revised: 21 May 2013

Overview

Serva32 2.1.0 TFTPD service contains a buffer overflow vulnerability.

Description

The Serva32 2.1.0 TFTPD service contains a buffer overflow vulnerability when parsing large read requests. When the application reads in a large buffer the application crashes.

Impact

An unauthenticated attacker can pass large read requests against the application causing it to crash.

Solution

We are currently unaware of a practical solution to this problem.

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
ServaAffected-13 May 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base5.4AV:N/AC:H/Au:N/C:N/I:N/A:C
Temporal3.9E:U/RL:W/RC:UC
Environmental1.1CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://www.vercot.com/~serva/

Credit

Thanks to Jonathan Christmas a researcher at Solera Networks for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs:CVE-2013-0145
  • Date Public:14 May 2013
  • Date First Published:14 May 2013
  • Date Last Updated:21 May 2013
  • Document Revision:18

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/127108

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2013-05-24 00:21:30
  • Multiple Updates
2013-05-21 17:18:10
  • Multiple Updates
2013-05-20 21:21:37
  • Multiple Updates
2013-05-16 17:18:08
  • Multiple Updates
2013-05-14 21:18:26
  • First insertion