CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
91.6%
Serva32 2.1.0 TFTPD service contains a buffer overflow vulnerability.
The Serva32 2.1.0 TFTPD service contains a buffer overflow vulnerability when parsing large read requests. When the application reads in a large buffer the application crashes.
An unauthenticated attacker can pass large read requests against the application causing it to crash.
We are currently unaware of a practical solution to this problem.
Restrict Network Access
As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.
127108
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 13, 2013
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | 5.4 | AV:N/AC:H/Au:N/C:N/I:N/A:C |
Temporal | 3.9 | E:U/RL:W/RC:UC |
Environmental | 1.1 | CDP:L/TD:L/CR:ND/IR:ND/AR:ND |
<http://www.vercot.com/~serva/>
Thanks to Jonathan Christmas a researcher at Solera Networks for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2013-0145 |
---|---|
Date Public: | 2013-05-14 Date First Published: |