[20897] in bugtraq

home help back first fref pref prev next nref lref last post

advisory for Pragma Interaccess

daemon@ATHENA.MIT.EDU (neme-dhc@hushmail.com)
Thu Jun 7 13:07:09 2001

From: neme-dhc@hushmail.com
Message-Id: <200106070048.RAA03887@user7.hushmail.com>
Content-type: multipart/mixed; boundary="Hushpart_boundary_PpfrQEwKanlDMbRdyJxMPaDSPayQNswh"
Mime-version: 1.0
To: bugtraq@securityfocus.com
Date: Wed, 6 Jun 2001 20:49:48 -0500 (EDT)

--Hushpart_boundary_PpfrQEwKanlDMbRdyJxMPaDSPayQNswh
Content-type: text/plain

 [ Advisory for Pragma InterAccess                 ]
 [ Pragma InterAccess is made by Pragma Systems    ]
 [ Site: http://www.pragmasys.com                  ]
 [ by nemesystm of the DHC                         ]
 [ (http://dhcorp.cjb.net - neme-dhc@hushmail.com) ]
 [ ADV-0119                                        ]

/-|=[explanation]=|-\
Pragma InterAccess provides daemons like telnet, 
rexecd and rshd for the Windows environment. It is
vulnerable to a denial of service.

/-|=[who is vulnerable]=|-\
Pragma InterAccess Release 4.0 Build 5
has been tested and was vulnerable. Prior versions
are assumed to be vulnerable as well.

/-|=[testing it]=|-\
Sending a burst of characters with a length of 
15000 to port 23 Interaccess will crash with:
Telnet95 has caused an error to occur in 
telnet95.exe

I have made a perl script that exploits this. It is
in the advisory that is available on the DHC site.
http://www.emc2k.com/dhcorp/homebrew/pragma.zip

/-|=[fix]=|-\
Install Pragma InterAccess Release 4.0 Build 6.
Free, encrypted, secure Web-based email at www.hushmail.com
--Hushpart_boundary_PpfrQEwKanlDMbRdyJxMPaDSPayQNswh--



home help back first fref pref prev next nref lref last post