Vulnerability Note VU#127108

Serva32 2.1.0 TFTPD service buffer overflow vulnerability

Original Release date: 14 May 2013 | Last revised: 21 May 2013


Serva32 2.1.0 TFTPD service contains a buffer overflow vulnerability.


The Serva32 2.1.0 TFTPD service contains a buffer overflow vulnerability when parsing large read requests. When the application reads in a large buffer the application crashes.


An unauthenticated attacker can pass large read requests against the application causing it to crash.


We are currently unaware of a practical solution to this problem.

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
ServaAffected-13 May 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 5.4 AV:N/AC:H/Au:N/C:N/I:N/A:C
Temporal 3.9 E:U/RL:W/RC:UC
Environmental 1.1 CDP:L/TD:L/CR:ND/IR:ND/AR:ND



Thanks to Jonathan Christmas a researcher at Solera Networks for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2013-0145
  • Date Public: 14 May 2013
  • Date First Published: 14 May 2013
  • Date Last Updated: 21 May 2013
  • Document Revision: 18


If you have feedback, comments, or additional information about this vulnerability, please send us email.