Jordan's Windows Telnet Server Password Handling Remote Overflow

high Nessus Plugin ID 11974

Language:

Synopsis

The remote telnet server has a stack-based buffer overflow vulnerability.

Description

According to its banner, the version of Jordan's Windows Telnet Server running on the remote host has a stack-based buffer overflow vulnerability in the login procedure. A remote attacker could exploit this to crash the service, or execute arbitrary code.

Solution

There is no known solution at this time. It appears this application is no longer actively maintained. Disable this service.

See Also

http://aluigi.altervista.org/adv/jordwts-adv.txt

Plugin Details

Severity: High

ID: 11974

File Name: jordan_telnet_overflow.nasl

Version: 1.18

Type: remote

Agent: windows

Family: Windows

Published: 1/1/2004

Updated: 8/8/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/29/2003

Reference Information

BID: 9316

Secunia: 2694