what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

labs34.htm

labs34.htm
Posted Feb 24, 2000
Authored by Underground Security Systems Research

USSR Advisory #34 - Local/Remote D.o.S Attack in InterAccess Telnet Server Release 4.0 (All Builds) Windows95/98/WinNT. The code that handles the Terminal client configurations to the Telnet server in the connection procedure contains a buffer overflow, causing Telnetd to crash.

tags | remote, overflow, local
systems | windows
SHA-256 | 0bdd9580503830aa0647e9839d98b921538bdc30f5ff55c343a02f65a3cc2142

labs34.htm

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Local/Remote D.o.S Attack in InterAccess Telnet Server Release 4.0
*ALL BUILDS* for Windows95/98/WinNT Vulnerability

USSR Advisory Code: USSR-2000034

Release Date:
February 24 2000

Systems Affected:
InterAccess TelnetD Server 4.0 for WinNT and others versions.
InterAccess TelnetD Server 4.0 for Windows95/98 and others versions.
InterAccess TelnetD Server 4.0 build 4 for WiNT
InterAccess TelnetD Server 4.0 build 5 for WiNT
InterAccess TelnetD Server 4.0 build 6 for WiNT
InterAccess TelnetD Server 4.0 build 7 for WiNT (Release 4.0 Build
Jan 5 2000)
InterAccess TelnetD Server 4.0 for Windows95/98 Build 3
InterAccess TelnetD Server 4.0 for Windows95/98 Build (Release 4.0
Build Jan 6 2000)


THE PROBLEM

UssrLabs found a Local / Remote DOS Attack, The code that handles the
Terminal client configurations to the
Telnet server in the connection procedure, has an unchecked size that
cause the TelnetD Service Crash.

Binary or source for this D.O.S:
https://www.ussrback.com/telnetd/dostelnetd.exe (binary)
https://www.ussrback.com/telnetd/dostelnetd.zip (Source)

Vendor Status:
We show to the vendor the d.o.s Problem and the vendor think we
pinging to the machine, so,
that is like Vendor not contacted :)

Vendor Url: https://www.pragmasys.com/
Program Url: https://www.pragmasys.com/TelnetD/
Program Url: https://www.pragmasys.com/Telnet95/

Credit: USSRLABS

SOLUTION
Contact Pragma Systems.

NOTE:
We try help pragma people to show their program is vulnerable to
D.o.S attack, and the only responce of
pragma was "STOP PING SERVER", so we decide release the advisory.


Greetings:
Eeye, Attrition, w00w00, beavuh, Rhino9, ADM, HNN, Technotronic and
Wiretrip.

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c
h
https://www.ussrback.com


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <https://www.pgp.com>

iQA/AwUBOLWkyNybEYfHhkiVEQKZGACeKRtpBWam+Hgplx9nRiWEy3yk4q8AoOHZ
yo9eCjR9zbFHQOr5L1OBKvGs
=cBLP
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close