Directory traversal vulnerability in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allows remote attackers to read arbitrary files via a TFTP GET request containing (1) "../" (dot dot slash) or (2) "..\" (dot dot backslash) sequences.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://secunia.com/advisories/15539 | third party advisory |
http://www.securityfocus.com/bid/13821 | vdb entry exploit |
http://securitytracker.com/id?1014079 | vdb entry exploit |
http://www.security.org.sg/vuln/tftp2000-1001.html | exploit |