Remote DoS Attack in Pragma TelnetServer 2000 (Remote Execute Daemon) Vulnerability
USSR Advisory Code: USSR-2000051
August 24, 2000
Pragma TelnetServer 2000 for Windows NT/2000
The Ussr Labs team has recently discovered a buffer overflow memory
problem in the rpc module of the Pragma TelnetServer 2000
What happens is by performing an attack with a malformed request to port 512
it will cause the process containing the services to crash.
That we take no responsibility for this code it is for educational purposes only.
[email@example.com$ telnet example.com 512
Connected to example.com.
Escape character is '^]'.
Where [buffer] is approx. 1000 NULL characters, and the process containg the service crashes
Fixed for Build 2 of TelnetServer 2000 released soon.
Vendor Url: http://www.pragmasys.com
Program Url: http://www.pragmasys.com/TelnetServer/
Underground Security Systems Research:
Attrition, w00w00, beavuh, Rhino9, Synnergy.net, SecurityFocus.com,
ADM, HNC, #Synnergy (efnet),#hackphreak (efnet), Technotronic, dethy,
thrill, RFP and Wiretrip.
Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without explicit
consent of Ussr. If you wish to reprint whole or any part of this
alert in any other medium excluding electronic medium, please e-mail
firstname.lastname@example.org for permission.
The information within this paper may change without notice. We may
not be held responsible for the use and/or potential effects of these
programs or advisories. Use them and read them at your own risk or
not at all. You solely are responsible for this judgement.
Please send suggestions, updates, and comments to:
Underground Security Systems Research