header-logo
Suggest Exploit
vendor:
N/A
by:
SecurityFocus
7.5
CVSS
HIGH
PCAnywhere32 Denial of Service
N/A
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2001

PCAnywhere32 Denial of Service

A malicious user can initiate a Denial of Service attack on a PCAnywhere32 server running TCP/IP networking by connecting to tcp port 5631 and inputting a large amount of data when prompted with 'Please press <Enter>'. This will cause the server to hang at 100% CPU utilization.

Mitigation:

Ensure that PCAnywhere32 is not running on the server and that the port is blocked.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/288/info

Servers running PCAnywhere32 with TCP/IP networking are subject to a Denial of Service attack that will hang the server at 100% CPU utilization. A malicious user may initiate this DoS by connecting to tcp port 5631 on the PCAnywhere server input a large amount of data when prompted with "Please press <Enter>".

Connect to tcp 5631. At the Please press <Enter> prompt, transfer a large amount of data to the PCAnywhere server. This will peg the CPU utilization at 100%.