what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files

GoodTechRCPT.txt
Posted Jul 28, 2005
Authored by Raphael Rigo

GoodTech versions 5.15 and below (and 5.16 evaluation) suffer from stack overflow vulnerabilities in the handling of the RCPT TO input.

tags | advisory, overflow, vulnerability
SHA-256 | d99bea5bc3c5546872d764d9ede2617885299aec72497604fa2a2e029d3f283a

Related Files

GoodTech Telnet Server <= 5.0.6 Buffer Overflow
Posted Nov 26, 2009
Authored by MC | Site metasploit.com

This Metasploit module exploits a stack overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution.

tags | exploit, overflow
advisories | CVE-2005-0768
SHA-256 | 9f3734e89194456c676c69c92e135e87c3feb64a676a4e371902a962180e9a3b
Secunia Security Advisory 32375
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has discovered a vulnerability in GoodTech SSH Server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | e2af9f69da4ed412025410980c843668682462b2769d2b7adc677fb938d714c3
goodtechssh-overflow.txt
Posted Oct 23, 2008
Authored by r0ut3r

GoodTech SSH remote buffer overflow exploit that leverages SSH_FXP_OPEN. Other operations are also vulnerable.

tags | exploit, remote, overflow
SHA-256 | f3164408344493f4dd8b44b3b08b4b3684ad0767f690e399ce5c045ca02c9a6a
un-D_0WNED.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

GoodTech Telnet Server for Windows NT/2000.

systems | windows
SHA-256 | 907e839f9751fef0930dce3be9d9044671372460a81c694c5e4022e8e07d1304
un-g0d.c
Posted Nov 2, 2005
Authored by unl0ck, Darkeagle | Site exploiterz.org

GoodTech Telnet Server versions 5.0 and below remote root exploit.

tags | remote, root
SHA-256 | 401b4f1dc1a78082494dfefdb04709e899b6ebddd4e4ce7b99c3cd0f3b876d50
Secunia Security Advisory 16186
Posted Jul 27, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Raphael Rigo has reported a vulnerability in GoodTech SMTP server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0f65600c00a4d19ebceff32dac02cd3fb8289d4aaadbb83c5569af24b8696a9b
goodtechDoS.txt
Posted Jun 20, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

GoodTech SMTP Server for Windows NT/2000/XP version 5.14 is susceptible to a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
SHA-256 | 6a659a01652487edb2b466186a3c43617aa2cdf0f3ba1a1a514251ccb1c33cb8
Secunia Security Advisory 15623
Posted Jun 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Reed Arvin has reported a vulnerability in GoodTech SMTP Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | b1b5c2548962dffff63d74d5b4dffe6a0e2392fd0a650034554323c9896053fa
goodtech.c
Posted Mar 22, 2005
Authored by cybertronic

Remote exploit for GoodTech Telnet server versions below 5.0.7. This exploit can spawn a bindshell or launch a reverse shell.

tags | exploit, remote, shell
SHA-256 | 589775b96701523a09ebbc413fcde21a03c4bcb8b334a15046465788ed9e1f10
gtscrash.c.txt
Posted Mar 22, 2005
Authored by Komrade

Remote denial of service exploit for GoodTech Telnet server versions below 5.0.7.

tags | exploit, remote, denial of service
SHA-256 | 50541d61ec0d111e523e600f46f1c0dd7b440d15b9b035a45d2f1b96478ac85e
goodtechtelnet.txt
Posted Mar 22, 2005
Authored by Komrade

GoodTech Telnet server versions prior to 5.0.7 are susceptible to a denial of service attack due to an oversized query.

tags | advisory, denial of service
SHA-256 | 5d162577f8f5bf0531044819ab92f816c3145c2628492490b99926244e8f7839
Secunia Security Advisory 14601
Posted Mar 22, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Komrade has reported a vulnerability in GoodTech Telnet Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c68175c766aeeadac56e87121073bf0ac5b36e60fdce9193ca67efb9be3f2579
gtsTsXp4.0.103-adv.txt
Posted Jan 8, 2004
Authored by Donato Ferrante | Site autistici.org

GoodTech Telnet Server 4.x for Microsoft Windows NT/2000/XP is susceptible to a denial of service attack when attempting to handle an overly long input string.

tags | advisory, denial of service
systems | windows
SHA-256 | 5c871cf563cc5cef0a8599c21076c25db7e87a2d6615675ca13014051d04ff28
iss.summary.6.3
Posted Feb 14, 2001
Site xforce.iss.net

ISS Security Alert Summary for February 6, 2001 - Volume 6 Number 3. 120 new vulnerabilities were reported this month. This document has links to more information and full advisories on each. Includes: win2k-rdp-dos, cisco-ccs-file-access, quicktime-embedded-tag-bo, solaris-ximp40-bo, cisco-ccs-cli-dos, slimserve-httpd-dos, crazywwwboard-qdecoder-bo, virusbuster-mua-bo, iis-isapi-obtain-code, bind-inverse-query-disclosure, hp-man-dos, sort-temp-file-abort, bind-complain-format-string, bind-complain-bo, winvnc-client-bo, winvnc-server-bo, guestserver-cgi-execute-commands, bind-tsig-bo, hyperseek-cgi-reveal-info, newsdaemon-gain-admin-access, mars-nwe-format-string, mars-nwe-format-string, planetintra-pi-bo, borderware-ping-dos, aol-malformed-url-dos, mirc-bypass-password, netscape-enterprise-revlog-dos, aim-execute-code, netscape-enterprise-list-directories, winnt-mutex-dos, jrun-webinf-file-retrieval, ipfw-bypass-firewall, netopia-telnet-dos, wuftp-debug-format-string, kde2-kdesu-retrieve-passwords, easycom-safecom-url-bo, easycom-safecom-printguide-dos, easycom-safecom-ftp-dos, vnc-weak-authentication, lotus-domino-smtp-bo, linux-sash-shadow-readable, powerpoint-execute-code, icecast-format-string, oracle-handlers-directory-traversal, oracle-handlers-execute-jsp, netscape-enterprise-dot-dos, goodtech-ftp-dos, netscape-fasttrack-cache-dos, eeye-iris-dos, watchguard-firebox-obtain-passphrase, fastream-ftp-server-dos, fastream-ftp-path-disclosure, localweb2k-directory-traversal, win2k-efs-recover-data, linux-bing-bo, micq-sprintf-remote-bo, mysql-select-bo, shoutcast-description-bo, fw1-limited-license-dos, fw1-limited-license-dos, hp-stm-dos, linux-webmin-tmpfiles, tinyproxy-remote-bo, postaci-sql-command-injection, wwwwais-cgi-dos, mime-header-attachment, ssh-rpc-private-key, linux-glibc-preload-overwrite, inn-tmpfile-symlink, interscan-viruswall-insecure-password, interscan-viruswall-weak-authentication, ie-mshtml-dos, dhcp-format-string, win-mediaplayer-arbitrary-code, veritas-backupexec-dos, interscan-viruswall-symlink, omnihttpd-statsconfig-corrupt-files, omnihttpd-statsconfig-execute-code, icmp-pmtu-dos, icmp-pmtu-dos, splitvt-perserc-format-string, splitvt-perserc-format-string, flash-module-bo, rctab-elevate-privileges, ultraboard-cgi-perm, compaq-web-management-bo, php-htaccess-unauth-access, basilix-webmail-retrieve-files, solaris-arp-bo, php-view-source-code, wec-ntlm-authentication, spamcop-url-seq-predict, linux-wuftpd-privatepw-symlink, rdist-symlink, squid-email-symlink, linux-diffutils-sdiff-symlimk, tcpdump-arpwatch-symlink, linuxconf-vpop3d-symlink, shadow-utils-useradd-symlink, linux-glibc-read-files, gettyps-symlink, linux-gpm-symlink, linux-mgetty-symlink, linux-apache-symlink, linux-inn-symlink, conferenceroom-developer-dos, oracle-xsql-execute-code, netscreen-webui-bo, suse-reiserfs-long-filenames, interbase-backdoor-account, interbase-hidden-function-dos, brickserver-thttpd-dos, solaris-exrecover-bo, hp-inetd-swait-dos, microsoft-iis-read-files, ibm-websphere-dos, storagesoft-imagecast-dos, nai-pgp-replace-keys, http-cgi-bbs-forum, lotus-domino-directory-traversal, http-cgi-fastgraf, newsdesk-cgi-read-files, gtk-module-execute-code, and linux-tty-writable-dos.

tags | remote, web, arbitrary, cgi, php, vulnerability
systems | cisco, linux, windows, solaris, suse
SHA-256 | cea13d6f0d4961c09e9e991e92cd2eb1b0f12363f3f1a83a83696b1ee0d06ccc
defcom.goodtech.ftp.txt
Posted Feb 2, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-03 - The GoodTech FTP server v3.0.1.2.1.0 does not properly free resources. This can result in the FTP server either crashing or displaying its banner and immediately disconnecting the user.

tags | exploit
SHA-256 | c21918a2c02a00334025bd3b621aa2fae135833c0f0c2652ea547b1c483be300
iss.summary.5.8
Posted Sep 15, 2000
Site xforce.iss.net

ISS Security Alert Summary for September 15, 2000. 87 new vulnerablities were reported this month. This document has links to more information and full advisories on each. Includes: ftp-goodtech-rnto-dos, imail-file-attachment, go-gnome-preinstaller-symlink, mailers-cgimail-spoof, win-netbios-corrupt-cache, news-publisher-add-author, xpdf-embedded-url, intel-express-switch-dos, viking-server-bo, win2k-corrupt-lsp, vqserver-get-dos, mgetty-faxrunq-symlink, money-plaintext-password, wormhttp-dir-traverse, wormhttp-filename-dos, cgi-auction-weaver-read-files, iis-cross-site-scripting, telnetserver-rpc-bo, nai-pgp-unsigned-adk, website-pro-upload-files, account-manager-overwrite-password, subscribe-me-overwrite-password, hp-netinit-symlink, realsecure-frag-syn-dos, sunjava-webadmin-bbs, zkey-java-compromise-accounts, java-vm-applet, darxite-login-bo, gopherd-halidate-bo, phpnuke-pwd-admin-access, becky-imail-header-dos, gnome-installer-overwrite-configuration, gnome-lokkit-open-ports, minicom-capture-groupown, webshield-smtp-dos, netwin-netauth-dir-traverse, xlock-format-d-option, frontpage-ext-device-name-dos, xchat-url-execute-commands, irix-worldview-wnn-bo, os2-ftpserver-login-dos, weblogic-plugin-bo, ie-folder-remote-exe, firebox-url-dos, trustix-secure-apache-misconfig, irix-telnetd-syslog-format, rapidstream-remote-execution, ntop-bo, iis-specialized-header, linux-update-race-condition, etrust-access-control-default, zope-additional-role, list-manager-elevate-privileges, iis-incorrect-permissions, varicad-world-write-permissions, gopherd-gdeskey-bo, gopherd-gdeskey-bo, mediahouse-stats-livestats-bo, linux-umb-scheme, mdaemon-session-id-hijack, tumbleweed-mms-blank-password, ie-scriptlet-rendering-file-access, office-html-object-tag, hp-openview-nnm-password, hp-newgrp, totalbill-remote-execution, solaris-answerbook2-admin-interface, perl-shell-escape, solaris-answerbook2-remote-execution, mopd-bo, java-brownorifice, diskcheck-tmp-race-condition, servu-null-character-dos, pccs-mysql-admin-tool, irix-xfs-truncate, win-ipx-ping-packet, nai-nettools-strong-bo, fw1-unauth-rsh-connection, win2k-named-pipes, sol-libprint-bo, ntop-remote-file-access, irix-grosview-bo, irix-libgl-bo, irix-dmplay-bo, irix-inpview-symlink, nettools-pki-dir-traverse, fw1-localhost-auth.

tags | java, remote, shell, cgi, perl, spoof
systems | linux, windows, solaris, irix
SHA-256 | dbd64db221e040e05a4a342ac92b13566073a9300c9dab57446e955bb03abca1
labs19.html
Posted Feb 9, 2000

USSR Advisory #19 - Remote DoS Attack in GoodTech Telnet Server NT v2.2.1 Vulnerability

tags | remote
SHA-256 | ea5d1c9d3c235695ef98e001b1c11037b99351027dbd18f9cb4a107191b09182
nt.security.update.121099.txt
Posted Dec 11, 1999
Authored by winsd

Security UPDATE Alert - An advisory has been released warning users about proper configuration to avoid an SQL Server 7.0 SA password compromise. A DoS vulnerability have been found in GoodTech's Telnet Server v.2.2.1. .rain.forrest.puppy. reported a DoS condition in Windows NT Server 4.0. The problem can lead to a crashed Service Manager and break functionality of named pipes. NTsecurity homepage here.

tags | denial of service, magazine
systems | windows
SHA-256 | 863ff8700ab0174402779a16fb094932e7f20189a85b160d817354aabd7c15d6
goodtech.telnet.dos.txt
Posted Dec 6, 1999
Authored by Underground Security Systems Research

UssrLabs found a Remote DoS Attack in GoodTech Telnet Server NT v2.2.1, the buffer overflow is caused by a long user name of 23870 characters.

tags | exploit, remote, overflow
SHA-256 | b4dcc58fec884a03dce61b82c3e2adf4c48d47d5a401906e01cde0d939a9be47
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close