header-logo
Suggest Exploit
vendor:
InterAccess TelnetID Server
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: InterAccess TelnetID Server
Affected Version From: 4
Affected Version To: 4
Patch Exists: YES
Related CWE: CVE-2002-0674
CPE: a:pragma_systems:interaccess_telnetid_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Pragma Systems InterAccess TelnetID Server 4.0 Buffer Overflow

The Pragma Systems InterAccess TelnetID Server 4.0 (Build 4) has an unchecked buffer in the code that handles login commands. Arbitrary code is capable of being executed on the InterAccess TelnetD Server if a string of over 300 characters is used as a login name.

Mitigation:

Upgrade to the latest version of Pragma Systems InterAccess TelnetID Server
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/995/info

The Pragma Systems InterAccess TelnetID Server 4.0 (Build 4) has an unchecked buffer in the code that handles login commands. Arbitrary code is capable of being executed on the InterAccess TelnetD Server if a string of over 300 characters is used as a login name.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19755-1.exe

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19755-2.zip