Problem:
PROBLEM
UssrLabs
found a Remote DoS Attack in BFTelnet Server v1.1 for Windows
NT.
The buffer overflow is caused by a long user name 3090 characters.
If BFTelnet Server is running as a service the service will exit
and no messages are displayed on the screen.
There
is not much to expand on.... just a simple hole
Example:
palometa@hellme]$
telnet example.com
Trying
example.com...
Connected
to example.com.
Escape
character is '^]'.
Byte
Fusion Telnet, Copyright 1999 Byte Fusion Corporation
Unregistered
Evaluation. See www.bytefusion.com/telnet.html
(Machine
name) Login: [buffer]
Where
[buffer] is aprox. 3090 characters.
At
his point the telnet server close.
Vendor
Status:
Contacted
Vendor
Url: www.bytefusion.com
Program Url: www.bytefusion.com/telnet.html
Credit:
USSRLABS
SOLUTION:
Nothing yet.
u
n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r
c h
|