Remote DoS Attack in Pragma TelnetServer 2000 (Remote Execute Daemon) Vulnerability

  Pragma TelnetServer 2000

 

 

Perl exploit

pragrpcdos.pl

Remote DoS Attack in Pragma TelnetServer 2000 (Remote Execute Daemon) Vulnerability


USSR Advisory Code:  USSR-2000051

Release Date:
August 24, 2000


Systems Affected:
Pragma TelnetServer 2000 for Windows NT/2000


THE PROBLEM:

The Ussr Labs team has recently discovered a buffer overflow memory 
problem in the rpc module of the Pragma TelnetServer 2000

What happens is by performing an attack with a malformed request to port 512 
it will cause the process containing the services to crash.


SPECIAL NOTE: 
That we take no responsibility for this code it is for educational purposes only.


DEMONSTRATION:
[hellme@die-communitech.net$ telnet example.com 512
Trying example.com...
Connected to example.com.
Escape character is '^]'.
[buffer]

Where [buffer] is approx. 1000 NULL characters, and the process containg the service crashes

PERL EXPLOIT:

pragrpcdos.pl

Vendor Status:  
Informed!, Contacted!.


Fix: 
Fixed for Build 2 of TelnetServer 2000 released soon.

Vendor   Url: http://www.pragmasys.com
Program  Url: http://www.pragmasys.com/TelnetServer/


Related Links:

Underground Security Systems Research:
http://www.ussrback.com

CrunchSp Product:
http://www.crunchsp.com


Greetings:
Attrition, w00w00, beavuh, Rhino9, Synnergy.net, SecurityFocus.com,
ADM, HNC, #Synnergy (efnet),#hackphreak (efnet), Technotronic, dethy,
thrill, RFP and Wiretrip.


Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without explicit
consent of Ussr. If you wish to reprint whole or any part of this
alert in any other medium excluding electronic medium, please e-mail
labs@ussrback.com for permission.


Disclaimer:
The information within this paper may change without notice. We may
not be held responsible for the use and/or potential effects of these
programs or advisories.  Use them and read them at your own risk or
not at all. You solely are responsible for this judgement. 


Feedback:
Please send suggestions, updates, and comments to:

Underground Security Systems Research
mail:labs@ussrback.com
http://www.ussrback.com