First published: Wed Jun 01 2005(Updated: )
Directory traversal vulnerability in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allows remote attackers to read arbitrary files via a TFTP GET request containing (1) "../" (dot dot slash) or (2) "..\" (dot dot backslash) sequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FutureSoft TFTP Server Multithreaded | =1.0.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1813 is considered to have a high severity due to its potential for unauthorized access to sensitive files.
To fix CVE-2005-1813, you should upgrade to a secure version of FutureSoft TFTP Server that does not contain the directory traversal vulnerability.
With CVE-2005-1813, an attacker can exploit the vulnerability to read arbitrary files on the server using directory traversal sequences.
CVE-2005-1813 affects FutureSoft TFTP Server Evaluation Version 1.0.0.1.
An attacker can exploit CVE-2005-1813 by sending a TFTP GET request that includes '../' or '..\' sequences to access restricted files.