File: 100000126.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (62 lines) | stat: -rw-r--r-- 1,152 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
Rule: 

--
Sid: 
100000126

-- 
Summary: 
This event is generated when an attempt is made to overflow a buffer in the 
GoodTech Telenet server.

-- 

Impact: 
The affected server will be crashed, and remote code execution with the 
privileges of the user running the telnet server is possible.

--
Detailed Information:
If the GoodTech telnet server recieves 10,083 bytes before a newline, a buffer 
will be overflowed. If properly crafted data is sent, arbitrary code may be 
executed with the privileges of the user running the server. Note that the rule 
looks for 1,000 or more bytes before a newline, due to limitations which do not 
allow a search for the full number of bytes required for the exploit.

--
Affected Systems:
GoodTech Telnet Server 4.0
GoodTech Telnet Server 5.0

--

Attack Scenarios: 
A script must be used to exploit this vulnerability.

-- 

Ease of Attack: 
Simple, as public exploits exist.

-- 

False Positives:
None Known.

--
False Negatives:
None Known.

-- 

Corrective Action: 
Upgrade to version 5.0.7 of the affected software.

--
Contributors: 
Alex Kirk <alex.kirk@sourcefire.com>

-- 
Additional References:

--