|  
                 
              PROBLEM:  
               UssrLabs found a Remote DoS Attack in GoodTech Telnet Server 
                NT v2.2.1, the buffer overflow is caused by a long user name 23870 
               
              characters.  
              There is not much to expand on.... just a simple hole  
              Example:  
              [gimmemore@itsme]$ telnet example.com  
              Trying example.com...  
              Connected to example.com.  
              Escape character is '^]'.  
              Welcome to GoodTech Telnet Server for Windows NT (V2.2) 
               (Evaluation Copy)  
              (C) Copyright 1996-1999 GoodTech Systems, Inc.  
              Login username: (buffer)  
              Overflow Crashh.  
              Where (buffer) is 23870 characters.  
              Vendor Status:  
              Contacted. Vendor Url: http://www.goodtechsys.com/  
              Program Url: http://www.goodtechsys.com/products.htm  
              Credit:  
              USSRLABS  
              SOLUTION: 
               Nothing yet. 
              u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a 
                r c h  
                
             |