Remote DoS Attack in BFTelnet Server v1.1 for Windows NT PROBLEM UssrLabs found a Remote DoS Attack in BFTelnet Server v1.1 for Windows NT, the buffer overflow is caused by a long user name 3090 characters. If BFTelnet Server is running as a service the service will exit and no messages are displayed on the screen. There is not much to expand on.... just a simple hole Example: palometa@hellme]$ telnet example.com Trying example.com... Connected to example.com. Escape character is '^]'. Byte Fusion Telnet, Copyright 1999 Byte Fusion Corporation Unregistered Evaluation. See www.bytefusion.com/telnet.html (Machine name) Login: [buffer] Where [buffer] is aprox. 3090 characters. At his point the telnet server close. Vendor Status: Contacted Vendor Url: www.bytefusion.com Program Url: www.bytefusion.com/telnet.html Credit: USSRLABS SOLUTION Nothing yet.