Remote DoS Attack in Pragma TelnetServer 2000 (Remote Execute Daemon) Vulnerability

  Pragma TelnetServer 2000



Perl exploit

Remote DoS Attack in Pragma TelnetServer 2000 (Remote Execute Daemon) Vulnerability

USSR Advisory Code:  USSR-2000051

Release Date:
August 24, 2000

Systems Affected:
Pragma TelnetServer 2000 for Windows NT/2000


The Ussr Labs team has recently discovered a buffer overflow memory 
problem in the rpc module of the Pragma TelnetServer 2000

What happens is by performing an attack with a malformed request to port 512 
it will cause the process containing the services to crash.

That we take no responsibility for this code it is for educational purposes only.

[$ telnet 512
Connected to
Escape character is '^]'.

Where [buffer] is approx. 1000 NULL characters, and the process containg the service crashes


Vendor Status:  
Informed!, Contacted!.

Fixed for Build 2 of TelnetServer 2000 released soon.

Vendor   Url:
Program  Url:

Related Links:

Underground Security Systems Research:

CrunchSp Product:

Attrition, w00w00, beavuh, Rhino9,,,
ADM, HNC, #Synnergy (efnet),#hackphreak (efnet), Technotronic, dethy,
thrill, RFP and Wiretrip.

Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without explicit
consent of Ussr. If you wish to reprint whole or any part of this
alert in any other medium excluding electronic medium, please e-mail for permission.

The information within this paper may change without notice. We may
not be held responsible for the use and/or potential effects of these
programs or advisories.  Use them and read them at your own risk or
not at all. You solely are responsible for this judgement. 

Please send suggestions, updates, and comments to:

Underground Security Systems Research