Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

TELNET:OVERFLOW:ABSOLUTE-UK2-OF

Severity

Major

Recommended

No

Recommended Action

Drop

Category

TELNET

Keywords

Absolute Telnet Buffer Overflow

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

TELNET: Absolute Telnet Buffer Overflow


This signature detects attempts to exploit a known vulnerability against Absolute Telnet client 2.0.0. Attackers can use a malicious Telnet server to overflow the buffer and execute arbitrary commands with permissions of the user that initiated the connection.

Extended Description

A buffer overflow vulnerability was reported for AbsoluteTelnet. The vulnerability exists due to insufficient bounds checking performed when setting the title bar of the client. An attacker can exploit this vulnerability by enticing a victim user to view a website with malicious HTML tags. This will cause the buffer overflow condition. Code execution may be possible.

Affected Products

  • Celestial_software absolutetelnet 2.0.0 0
  • Celestial_software absolutetelnet 2.11.0

References

  • BugTraq: 6785
  • CVE: CVE-2003-1090
  • URL: http://www.remoteassessment.com/darchive/191005368.html
  • URL: http://www.securiteam.com/windowsntfocus/5MP0C0095M.html
  • URL: https://services.netscreen.com/restricted/sigupdates/nsm-updates/HTML/TELNET:OVERFLOW:ABSOLUTE-UK2-OF.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out