KpyM Telnet Server DoS

medium Nessus Plugin ID 11983

Language:

Synopsis

The remote telnet server is prone to a denial of service attack.

Description

The remote host is running KpyM Telnet Server, a Telnet server for Windows.

According to its banner, the installed version of KpyM is older than 1.06. Such versions mark a connection as free before all components, such as sockets and threads, are shut down. By flooding the service with connections, an attacker can cause the service to crash.

Solution

Upgrade to version 1.06 or later.

See Also

http://norpius.altervista.org/kpymen.htm

Plugin Details

Severity: Medium

ID: 11983

File Name: kpym_telnet_overflow.nasl

Version: 1.14

Type: remote

Agent: windows

Family: Windows

Published: 1/7/2004

Updated: 8/8/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/3/2004

Vulnerability Publication Date: 1/2/2004

Reference Information

BID: 9379