BFTelnet Server ver 1.1 vulnerable to remote DoS
----------------------------------------------------------------------------
----


SUMMARY

A remote DoS Attack in  <http://www.bytefusion.com/> ByteFusion's BFTelnet 
Server v1.1 for Windows NT has been discovered. The buffer overflow is 
caused by passing a long user name in the authentication session (3090 
characters). If BFTelnet Server is running as a service the service will 
exit and no messages will be displayed on the screen.

DETAILS

Example:

$ telnet example.com
Trying example.com...
Connected to example.com.
Escape character is '^]'.
Byte Fusion Telnet, Copyright 1999 Byte Fusion Corporation
Unregistered Evaluation. See  <www.bytefusion.com/telnet.html> 
www.bytefusion.com/telnet.html
(Machine name) Login: [buffer]

Where the buffer is approximately 3090 characters. At his point the telnet 
server crashes.


ADDITIONAL INFORMATION

This vulnerability has been discovered by:  <mailto:[EMAIL PROTECTED]> 
Ussr Labs.



======================================== 

-------
AFLHI 058009990407128029/089802---(102598//991024)


    milis ini didukung oleh :
 >> http://www.indolinux.com - dunia linux indonesia
 -------------------------------------------------------------------
 untuk berhenti kirim  email  ke  [EMAIL PROTECTED]
 untuk melihat peraturan kirim email  ke  [EMAIL PROTECTED]
 arsip berada di  http://www.mail-archive.com/[email protected]
 

Kirim email ke