ID CVE-2010-2028
Type cve
Reporter NVD
Modified 2017-08-16T21:32:35
Description
Buffer overflow in k23productions TFTPUtil GUI (aka TFTPGUI) 1.4.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long transport mode.
{"id": "CVE-2010-2028", "bulletinFamily": "NVD", "title": "CVE-2010-2028", "description": "Buffer overflow in k23productions TFTPUtil GUI (aka TFTPGUI) 1.4.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long transport mode.", "published": "2010-05-24T15:30:01", "modified": "2017-08-16T21:32:35", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2028", "reporter": "NVD", "references": ["https://exchange.xforce.ibmcloud.com/vulnerabilities/58283", "http://www.securityfocus.com/bid/39872", "http://www.exploit-db.com/exploits/12530", "http://www.exploit-db.com/exploits/12482"], "cvelist": ["CVE-2010-2028"], "type": "cve", "lastseen": "2017-08-17T11:14:50", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:mgenti:tftputil_gui:1.4.5"], "cvelist": ["CVE-2010-2028"], "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "description": "Buffer overflow in k23productions TFTPUtil GUI (aka TFTPGUI) 1.4.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long transport mode.", "edition": 1, "enchantments": {}, "hash": "fdedb9801b59581c1aa9938c7ebcc55c2a86682a53a6546c4f37a723c2eab040", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "ebcc800f8a766bcabb19a74d64799cbc", "key": "cpe"}, {"hash": "b42c3d7c50efa70bd986544cd93fb1fe", "key": "modified"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "f0e44184036bd6f049e9da9de1b734a6", "key": "references"}, {"hash": "2bdabeb49c44761f9565717ab0e38165", "key": "cvss"}, {"hash": "81bc39233974f4e6c7b2fc51f976e5df", "key": "published"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "6c6944ede14b7e9bd183d9af8012a86c", "key": "cvelist"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "b72dcdb42f79c0369a58c053f24f6f1d", "key": "description"}, {"hash": "49fda5e97d8eff60c909078eba792942", "key": "title"}, {"hash": "12c8f04020dd286051a0240584ee2fe3", "key": "href"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2028", "id": "CVE-2010-2028", "lastseen": "2016-09-03T13:57:14", "modified": "2010-05-26T00:00:00", "objectVersion": "1.2", "published": "2010-05-24T15:30:01", "references": ["http://www.securityfocus.com/bid/39872", "http://www.exploit-db.com/exploits/12530", "http://xforce.iss.net/xforce/xfdb/58283", "http://www.exploit-db.com/exploits/12482"], "reporter": "NVD", "scanner": [], "title": "CVE-2010-2028", "type": "cve", "viewCount": 1}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T13:57:14"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "ebcc800f8a766bcabb19a74d64799cbc"}, {"key": "cvelist", "hash": "6c6944ede14b7e9bd183d9af8012a86c"}, {"key": "cvss", "hash": "2bdabeb49c44761f9565717ab0e38165"}, {"key": "description", "hash": "b72dcdb42f79c0369a58c053f24f6f1d"}, {"key": "href", "hash": "12c8f04020dd286051a0240584ee2fe3"}, {"key": "modified", "hash": "35b5edb1439b6eb224381033e44b890c"}, {"key": "published", "hash": "81bc39233974f4e6c7b2fc51f976e5df"}, {"key": "references", "hash": "ec7372f4b10044acdf38436fcbcd7899"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "49fda5e97d8eff60c909078eba792942"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "86a3f45eeeb8adfa2bf2c4afeaa45e3fde4b69fbec34049b7d51a80d2ce3de4e", "viewCount": 1, "enchantments": {"vulnersScore": 7.5}, "objectVersion": "1.3", "cpe": ["cpe:/a:mgenti:tftputil_gui:1.4.5"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"result": {"openvas": [{"id": "OPENVAS:1361412562310100618", "type": "openvas", "title": "TFTPUtil GUI Long Transport Mode Buffer Overflow Vulnerability", "description": "TFTPUtil GUI is prone to a buffer-overflow vulnerability.", "published": "2010-05-04T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310100618", "cvelist": ["CVE-2010-2028"], "lastseen": "2017-09-15T13:29:24"}], "exploitdb": [{"id": "EDB-ID:12530", "type": "exploitdb", "title": "TFTPGUI 1.4.5 - Long Transport Mode Overflow DoS Meta", "description": "TFTPGUI v1.4.5 Long Transport Mode Overflow DoS (Meta). CVE-2010-2028. Dos exploit for windows platform", "published": "2010-05-08T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/12530/", "cvelist": ["CVE-2010-2028"], "lastseen": "2016-02-01T16:43:13"}, {"id": "EDB-ID:12482", "type": "exploitdb", "title": "TFTPGUI - Long Transport Mode Overflow", "description": "TFTPGUI Long Transport Mode Overflow. CVE-2010-2028. Dos exploit for windows platform", "published": "2010-05-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.exploit-db.com/exploits/12482/", "cvelist": ["CVE-2010-2028"], "lastseen": "2016-02-01T16:35:44"}]}}