UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1, the buffer overflow is caused by a long user name of 23870 characters.
b4dcc58fec884a03dce61b82c3e2adf4c48d47d5a401906e01cde0d939a9be47
Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability
PROBLEM
UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1,
the buffer overflow is caused by a long user name 23870 characters.
There is not much to expand on.... just a simple hole
Example:
[gimmemore@itsme]$ telnet example.com
Trying example.com...
Connected to example.com.
Escape character is '^]'.
Welcome to GoodTech Telnet Server for Windows NT (V2.2) (Evaluation Copy)
(C) Copyright 1996-1999 GoodTech Systems, Inc.
Login username: (buffer)
Overflow Crashh.
Where (buffer) is 23870 characters.
Vendor Status:
Contacted.
Vendor Url: http://www.goodtechsys.com/
Program Url: http://www.goodtechsys.com/products.htm
Credit: USSRLABS
SOLUTION
Nothing yet.
u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h
http://www.ussrback.com