KpyM Telnet Server contains a flaw that may allow a remote denial of service. The issue is triggered when the server is flodded with too many connection, and will result in loss of availability for the service.
Upgrade to version 1.06 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Vendor URL: http://kpym.sourceforge.net/ Secunia Advisory ID:10528 Other Advisory URL: http://norpius.altervista.org/kpym.htm Nessus Plugin ID:11983 Generic Exploit URL: http://norpius.altervista.org/kpym.zip Bugtraq ID: 9379