CVE-2012-6664

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to read or write arbitrary files on systems running Distinct Intranet Servers TFTP Server 3.10 and earlier. Attackers can exploit directory traversal via specially crafted TFTP commands containing '..' sequences. Organizations using this TFTP server software are affected.

💻 Affected Systems

Products:
  • Distinct Intranet Servers TFTP Server
Versions: 3.10 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Any system with the vulnerable TFTP server exposed to network access is affected. The vulnerability exists in the TFTP protocol implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file writes (potentially creating backdoors, modifying system files) or sensitive data exfiltration through arbitrary file reads.

🟠

Likely Case

Unauthorized file access leading to data theft, configuration file modification, or planting malicious files for further exploitation.

🟢

If Mitigated

Limited impact if TFTP server runs with minimal privileges, filesystem permissions restrict access, and network segmentation isolates the service.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication. Simple directory traversal attacks can be automated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.11 or later

Vendor Advisory: https://www.distinct.com/

Restart Required: Yes

Instructions:

1. Download latest version from Distinct website. 2. Backup configuration. 3. Install update. 4. Restart TFTP service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict TFTP server access to trusted networks only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="udp" port="69" accept'
netsh advfirewall firewall add rule name="Restrict TFTP" dir=in action=allow protocol=UDP localport=69 remoteip=TRUSTED_NETWORK

Service Account Hardening

all

Run TFTP service with minimal privileges

sc config "DistinctTFTP" obj= "NT AUTHORITY\LocalService"
setfacl -m u:tfptuser:rx /var/lib/tftpboot

🧯 If You Can't Patch

  • Disable TFTP server if not required
  • Implement strict filesystem permissions and monitor for unauthorized file access

🔍 How to Verify

Check if Vulnerable:

Check TFTP server version in administration interface or via 'strings' command on binary looking for version 3.10 or earlier

Check Version:

On Windows: Check program version in Control Panel. On Linux: strings /usr/bin/distinct-tftp | grep -i version

Verify Fix Applied:

Verify version is 3.11 or later and test with directory traversal attempts using TFTP client

📡 Detection & Monitoring

Log Indicators:

  • TFTP requests containing '..' sequences in filenames
  • Unauthorized file access attempts in system logs

Network Indicators:

  • TFTP traffic with unusual filename patterns
  • TFTP requests to sensitive directory paths

SIEM Query:

source="tftp.log" AND (filename="*..*" OR filename="*/../*")

🔗 References

📤 Share & Export