[12863] in bugtraq
Remote DoS Attack in GoodTech Telnet Server NT v2.2.1
daemon@ATHENA.MIT.EDU (Ussr Labs)
Mon Dec 6 14:43:22 1999
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <NCBBKFKDOLAGKIAPMILPAEDACBAA.labs@ussrback.com>
Date: Mon, 6 Dec 1999 03:18:18 -0300
Reply-To: Ussr Labs <labs@USSRBACK.COM>
From: Ussr Labs <labs@USSRBACK.COM>
X-To: BUGTRAQ <bugtraq@securityfocus.com>
To: BUGTRAQ@SECURITYFOCUS.COM
Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability
PROBLEM
UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1,
the buffer overflow is caused by a long user name 23870 characters.
There is not much to expand on.... just a simple hole
Example:
[gimmemore@itsme]$ telnet example.com
Trying example.com...
Connected to example.com.
Escape character is '^]'.
Welcome to GoodTech Telnet Server for Windows NT (V2.2) (Evaluation Copy)
(C) Copyright 1996-1999 GoodTech Systems, Inc.
Login username: (buffer)
Overflow Crashh.
Where (buffer) is 23870 characters.
Vendor Status:
Contacted.
Vendor Url: http://www.goodtechsys.com/
Program Url: http://www.goodtechsys.com/products.htm
Credit: USSRLABS
SOLUTION
Nothing yet.
u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h
http://www.ussrback.com