Summary
This host is running OpenTFTP Server and is prone to buffer overflow vulnerability.
Impact
Successful exploitation will allow attackers to cause denial of service attacks.
Solution
Upgrade to OpenTFTP Server SP version 1.5 or later For updates refer to http://sourceforge.net/projects/tftp-server/
Insight
The flaw is due to a boundary error in the handling of filenames and can be exploited to cause a stack-based buffer overflow via a read request with an overly long filename.
Affected
OpenTFTP Server SP version 1.4
References