what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

labs34.htm

labs34.htm
Posted Feb 24, 2000
Authored by Underground Security Systems Research

USSR Advisory #34 - Local/Remote D.o.S Attack in InterAccess Telnet Server Release 4.0 (All Builds) Windows95/98/WinNT. The code that handles the Terminal client configurations to the Telnet server in the connection procedure contains a buffer overflow, causing Telnetd to crash.

tags | remote, overflow, local
systems | windows
SHA-256 | 0bdd9580503830aa0647e9839d98b921538bdc30f5ff55c343a02f65a3cc2142

labs34.htm

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Local/Remote D.o.S Attack in InterAccess Telnet Server Release 4.0
*ALL BUILDS* for Windows95/98/WinNT Vulnerability

USSR Advisory Code: USSR-2000034

Release Date:
February 24 2000

Systems Affected:
InterAccess TelnetD Server 4.0 for WinNT and others versions.
InterAccess TelnetD Server 4.0 for Windows95/98 and others versions.
InterAccess TelnetD Server 4.0 build 4 for WiNT
InterAccess TelnetD Server 4.0 build 5 for WiNT
InterAccess TelnetD Server 4.0 build 6 for WiNT
InterAccess TelnetD Server 4.0 build 7 for WiNT (Release 4.0 Build
Jan 5 2000)
InterAccess TelnetD Server 4.0 for Windows95/98 Build 3
InterAccess TelnetD Server 4.0 for Windows95/98 Build (Release 4.0
Build Jan 6 2000)


THE PROBLEM

UssrLabs found a Local / Remote DOS Attack, The code that handles the
Terminal client configurations to the
Telnet server in the connection procedure, has an unchecked size that
cause the TelnetD Service Crash.

Binary or source for this D.O.S:
http://www.ussrback.com/telnetd/dostelnetd.exe (binary)
http://www.ussrback.com/telnetd/dostelnetd.zip (Source)

Vendor Status:
We show to the vendor the d.o.s Problem and the vendor think we
pinging to the machine, so,
that is like Vendor not contacted :)

Vendor Url: http://www.pragmasys.com/
Program Url: http://www.pragmasys.com/TelnetD/
Program Url: http://www.pragmasys.com/Telnet95/

Credit: USSRLABS

SOLUTION
Contact Pragma Systems.

NOTE:
We try help pragma people to show their program is vulnerable to
D.o.S attack, and the only responce of
pragma was "STOP PING SERVER", so we decide release the advisory.


Greetings:
Eeye, Attrition, w00w00, beavuh, Rhino9, ADM, HNN, Technotronic and
Wiretrip.

u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c
h
http://www.ussrback.com


-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.5.2 for non-commercial use <http://www.pgp.com>

iQA/AwUBOLWkyNybEYfHhkiVEQKZGACeKRtpBWam+Hgplx9nRiWEy3yk4q8AoOHZ
yo9eCjR9zbFHQOr5L1OBKvGs
=cBLP
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close