|Category:||Remote file access|
|Title:||AT TFTP Server Directory Traversal Vulnerability|
|Summary:||The host is running AT TFTP Server and is prone to directory; traversal vulnerability.|
The host is running AT TFTP Server and is prone to directory
The flaw is due to an error while handling certain requests
which can be exploited to download arbitrary files from the host system.
Successful exploitation will allow attackers to read arbitrary
files on the affected application.
AT-TFTP Server version 1.8.
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.
|Copyright||Copyright (C) 2010 Greenbone Networks GmbH|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.