Jordan's Windows Telnet Server Password Handling Remote Overflow

High Nessus Plugin ID 11974


The remote telnet server has a stack-based buffer overflow vulnerability.


According to its banner, the version of Jordan's Windows Telnet Server running on the remote host has a stack-based buffer overflow vulnerability in the login procedure. A remote attacker could exploit this to crash the service, or execute arbitrary code.


There is no known solution at this time. It appears this application is no longer actively maintained. Disable this service.

See Also

Plugin Details

Severity: High

ID: 11974

File Name: jordan_telnet_overflow.nasl

Version: $Revision: 1.16 $

Type: remote

Agent: windows

Family: Windows

Published: 2004/01/01

Modified: 2014/05/30

Dependencies: 17975

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2003/12/29

Reference Information

BID: 9316

OSVDB: 3257

Secunia: 2694