RealServer G2 Malformed Telnet Data Remote Overflow

Critical Nessus Plugin ID 10200


Arbitrary code may be run on the remote server.


If a user sends an oversized login / password combination to the administrative server of a RealServer G2, it will overflow the server's buffer.

An attacker can use this flaw to execute arbitrary code on the remote system.


Filter incoming traffic to the administrative port of the RealServer G2.

Plugin Details

Severity: Critical

ID: 10200

File Name: realserverg2.nasl

Version: $Revision: 1.28 $

Type: remote

Published: 1999/11/04

Modified: 2014/01/14

Dependencies: 10107

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:realnetworks:realserver

Excluded KB Items: global_settings/supplied_logins_only

Vulnerability Publication Date: 2000/01/15

Reference Information

CVE: CVE-1999-0271

OSVDB: 5859