Lucene search

K

worldclient.2.0.0.0.dos.txt

🗓️ 25 Nov 1999 00:00:00Reported by Underground Security Systems ResearchType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 16 Views

Remote Denial of Service vulnerability in WorldClient Server v2.0.0.0 due to buffer overflow.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Remote DoS Attack in WorldClient Server v2.0.0.0 Vulnerability  
  
PROBLEM:  
UssrLabs found a buffer overflow in WorldClient Server v2.0.0.0 where they  
do not use proper bounds checking.  
The following all result in a Denial of Service against the service in  
question.  
  
affected services:  
  
WorldClient: Port 2000  
  
This two remotes services are affected to overflow of you send a large url  
name.  
  
Like: http:/serverip/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa  
  
For the Binary / Source for this WorldClient Server v2.0.0.0 Denial of  
Service:  
  
Go To: http://www.ussrback.com/mdeam285/  
  
  
Vendor Status:  
Contacted.  
  
Vendor Url: http://www.mdaemon.com  
  
Credit: USSRLABS  
  
SOLUTION  
Nothing yet.  
  
u n d e r g r o u n d s e c u r i t y s y s t e m s r e s e a r c h  
http://www.ussrback.com  
  
  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
25 Nov 1999 00:00Current
7.4High risk
Vulners AI Score7.4
16
.json
Report