header-logo
Suggest Exploit
vendor:
GoodTech Telnet Server NT
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: GoodTech Telnet Server NT
Affected Version From: 2.2.2001
Affected Version To: 2.2.2001
Patch Exists: Yes
Related CWE: N/A
CPE: a:goodtech_systems:goodtech_telnet_server_nt:2.2.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows NT
1999

GoodTech Telnet Server NT 2.2.1 Remote Denial of Service Vulnerability

GoodTech Telnet Server NT 2.2.1 is vulnerable to a remote denial of service attack due to an unchecked buffer. If 23870 or more characters are entered at the username prompt, the software will crash. GoodTech's Telnet Server 95/98 may also be vulnerable to this overflow.

Mitigation:

Upgrade to the latest version of GoodTech Telnet Server.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/862/info


GoodTech Telnet Server NT 2.2.1 is vulnerable to a remote denial of service attack due to an unchecked buffer. If 23870 or more characters are entered at the username prompt, the software will crash.

GoodTech's Telnet Server 95/98 may also be vulnerable to this overflow. 

$ telnet victimhost

Trying victimhost...
Connected to victimhost.
Escape character is '^]'.

Welcome to GoodTech Telnet Server for Windows NT (V2.2) (Evaluation Copy)

(C) Copyright 1996-1999 GoodTech Systems, Inc.


Login username: (32870 characters)

...server crash