GAMSoft TelSrv 1.4/1.5 Username Overflow DoS

high Nessus Plugin ID 10474

Synopsis

The remote telnet server has a buffer overflow vulnerability.

Description

It is possible to crash the remote telnet server by sending a username that is 4550 characters or longer. A remote attacker could exploit this to crash the service, or potentially execute arbitrary code.

Solution

There is no known solution at this time.

See Also

http://www.nessus.org/u?2999867b

Plugin Details

Severity: High

ID: 10474

File Name: TelSrv_DoS.nasl

Version: 1.32

Type: remote

Agent: windows

Family: Windows

Published: 7/17/2000

Updated: 6/27/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/17/2000

Exploitable With

Metasploit (GAMSoft TelSrv 1.5 Username Buffer Overflow)

Reference Information

CVE: CVE-2000-0665

BID: 1478