Dragon Telnet Server Login Name Handling Remote Overflow DoS

medium Nessus Plugin ID 10451

Synopsis

The remote server is vulnerable to a denial of service.

Description

It was possible to shut down the remote telnet server by issuing a far too long login name (over 16,000 chars)

This problem allows an attacker to prevent remote administration of this host.

Solution

Upgrade to the latest version your telnet server.

Plugin Details

Severity: Medium

ID: 10451

File Name: dragon_telnet.nasl

Version: 1.27

Type: remote

Agent: windows

Family: Windows

Published: 6/27/2000

Updated: 7/10/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/16/2000

Reference Information

CVE: CVE-2000-0480

BID: 1352