Search 202850 CVE descriptions
and 87302 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Remote file access
Title:Ipswitch TFTP Server Directory Traversal Vulnerability
Summary:The host is running Ipswitch TFTP Server and is prone to directory; traversal vulnerability.
The host is running Ipswitch TFTP Server and is prone to directory
traversal vulnerability.

Vulnerability Insight:
The flaw is due to an error while handling certain requests
containing 'dot dot' sequences (..), which can be exploited to download
arbitrary files from the host system.

Vulnerability Impact:
Successful exploitation will allow attackers to read arbitrary
files on the affected application.

Affected Software/OS:
Ipswitch TFTP Server Version and prior.

No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:

CVSS Vector:

Cross-Ref: BugTraq ID: 50890
Common Vulnerability Exposure (CVE) ID: CVE-2011-4722
HPdes Security Advisory: HPSBGN3547
XForce ISS Database: ipswitch-tftp-directory-traversal(71610)
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.