exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

gtsTsXp4.0.103-adv.txt

gtsTsXp4.0.103-adv.txt
Posted Jan 8, 2004
Authored by Donato Ferrante | Site autistici.org

GoodTech Telnet Server 4.x for Microsoft Windows NT/2000/XP is susceptible to a denial of service attack when attempting to handle an overly long input string.

tags | advisory, denial of service
systems | windows
SHA-256 | 5c871cf563cc5cef0a8599c21076c25db7e87a2d6615675ca13014051d04ff28

gtsTsXp4.0.103-adv.txt

Change Mirror Download
                           Donato Ferrante


Application: GoodTech Systems Telnet Server for Windows NT/2000/XP
http://www.goodtechsys.com/

Version: 4.0.103

Bug: Denial of Service

Author: Donato Ferrante
e-mail: fdonato@autistici.org
web: www.autistici.org/fdonato


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

1. Description
2. The bug
3. The code
4. The fix


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

----------------
1. Description:
----------------

Vendor's Description:

"The product turns a Windows NT/2000/XP system into a multi-user
Telnet server. Gives Telnet users full access to Windows NT command
line. Telnet users can run a variety of character-based applications.
Accepts any telnet connection from any client (Unix, NT, 2000, 95,
98, Me, any wireless handheld, etc.) right out of the box. Features
include support for both line mode (with scroll buffer) and screen
mode, local printing on the client side, connection restriction based
on Host or IP address, connection restriction based on number of
users, etc."


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

------------
2. The bug:
------------

The program, doesn't make a good check on the strings passed as input,
so is possible to send a big string in input and the telnet server
will crash without warnings.


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

-------------
3. The code:
-------------

To test the vulnerability simply send a big string to the telnet server,

perl -e 'print "a"x8245' | nc server 23

or generally a string like:

aaaa[..a..]aa ( 8245 of a )

so the telnet server will go down.
Note: no errors will be reported in the logfile of the server.


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

------------
4. The fix:
------------

To fix the bug simply go on the GoodTech Systems' official website,
http://www.goodtechsys.com/, and download the latest version 4.0.104
of GoodTech Systems Telnet Server for Windows NT/2000/XP.


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close