RealServer G2 Malformed Telnet Data Remote Overflow

critical Nessus Plugin ID 10200

Synopsis

Arbitrary code may be run on the remote server.

Description

If a user sends an oversized login / password combination to the administrative server of a RealServer G2, it will overflow the server's buffer.

An attacker can use this flaw to execute arbitrary code on the remote system.

Solution

Filter incoming traffic to the administrative port of the RealServer G2.

Plugin Details

Severity: Critical

ID: 10200

File Name: realserverg2.nasl

Version: 1.29

Type: remote

Published: 11/4/1999

Updated: 8/13/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realserver

Excluded KB Items: global_settings/supplied_logins_only

Vulnerability Publication Date: 1/15/2000

Reference Information

CVE: CVE-1999-0271