|Category:||Remote file access|
|Title:||YaTFTPSvr TFTP Server Directory Traversal Vulnerability|
|Summary:||YaTFTPSvr TFTP Server is prone to a directory-traversal vulnerability; because it fails to sufficiently sanitize user-supplied input.|
YaTFTPSvr TFTP Server is prone to a directory-traversal vulnerability
because it fails to sufficiently sanitize user-supplied input.
A remote attacker could exploit this vulnerability using directory-
traversal strings (such as '../') to upload and download arbitrary files outside of the TFTP server
root directory. This could help the attacker launch further attacks.
YaTFTPSvr 220.127.116.11 is vulnerable. Other versions may also be
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.
BugTraq ID: 50441|
|Copyright||Copyright (C) 2011 Greenbone Networks GmbH|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.