|Category:||Remote file access|
|Title:||Quick Tftp Server Pro Directory Traversal Vulnerability|
|Summary:||Quick Tftp Server Pro is prone to a directory-traversal vulnerability; because it fails to sufficiently sanitize user-supplied input.|
Quick Tftp Server Pro is prone to a directory-traversal vulnerability
because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue can allow an attacker to retrieve arbitrary
files outside of the FTP server root directory. This may aid in further attacks.
Quick Tftp Server Pro 2.1 is vulnerable. Other versions may also
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
BugTraq ID: 44712|
|Copyright||Copyright (C) 2010 Greenbone Networks GmbH|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.