GoodTech Telnet server versions prior to 5.0.7 are susceptible to a denial of service attack due to an oversized query.
5d162577f8f5bf0531044819ab92f816c3145c2628492490b99926244e8f7839
AUTHOR
Komrade
unsecure@altervista.org
Original advisory:
https://unsecure.altervista.org/security/goodtechtelnet.htm
DATE
15/03/2005
PRODUCT
The product turns a Windows NT/2000/XP/2003 system into a multi-user
Telnet server. Gives Telnet users full access to Windows NT command
line. (informations from the website https://www.goodtechsys.com)
Administration commands can be performed via a web browser. This feature
gives you a Graphic interface to administrate the Telnet Server product.
(informations from readme.htm file)
AFFECTED VERSION
All verion prior to 5.0.7 (version fixed by the vendor)
Versions verified to be vulnerable:
5.0
4.0
DETAILS
This program has a vulnerabilty in the administration web server, which
runs on the default port 2380. If a very long string (10040 bytes) ended
by two newline characters is sent to this server, a buffer overflow
vulnerability occurs, overwriting the instruction pointer and giving the
possibility to execute arbitrary code remotely in the LOCAL_SYSTEM context.
POC EXPLOIT
You can find a proof of concept exploit that crashes the vulnerable
servers on:
https://unsecure.altervista.org/security/gtscrash.c.txt
VENDOR STATUS
I notified this vulnerability to the vendor on 14/03/2005 and they fixed
it in the new version 5.0.7
See https://www.goodtechsys.com to download the new fixed version.
VULNERABILITY TIMELINE
11/03/2005 Vulnerability found.
14/03/2005 Vendor contacted.
15/03/2005 Vendor reply.
15/03/2005 Vulnerability fixed. A new version of GoodTech Telnet Server
is now avaible.
--
- Unsecure Programs -
- https://unsecure.altervista.org -