|  
               Problem: 
               PROBLEM 
                 
              UssrLabs 
                found a Remote DoS Attack in BFTelnet Server v1.1 for Windows 
                NT. 
               
                The buffer overflow is caused by a long user name 3090 characters. 
               
                If BFTelnet Server is running as a service the service will exit 
               
                and no messages are displayed on the screen.  
              There 
                is not much to expand on.... just a simple hole  
                
              Example: 
                  
              palometa@hellme]$ 
                telnet example.com  
              Trying 
                example.com...  
              Connected 
                to example.com.  
              Escape 
                character is '^]'.  
              Byte 
                Fusion Telnet, Copyright 1999 Byte Fusion Corporation  
              Unregistered 
                Evaluation. See www.bytefusion.com/telnet.html  
              (Machine 
                name) Login: [buffer]  
              Where 
                [buffer] is aprox. 3090 characters.  
              At 
                his point the telnet server close.  
              Vendor 
                Status:  
              Contacted 
                 
              Vendor 
                Url: www.bytefusion.com 
               
                Program Url: www.bytefusion.com/telnet.html  
              Credit: 
                USSRLABS  
              SOLUTION: 
               
                Nothing yet.  
              u 
                n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r 
                c h  
               |