Vulnerability Details : CVE-2005-0768
Public exploit exists!
Buffer overflow in the administration web server for GoodTech Telnet Server 4.0 and 5.0, and possibly all versions before 5.0.7, allows remote attackers to execute arbitrary code via a long string to port 2380.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2005-0768
Probability of exploitation activity in the next 30 days: 19.58%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2005-0768
-
GoodTech Telnet Server Buffer Overflow
Disclosure Date: 2005-03-15First seen: 2020-04-26exploit/windows/telnet/goodtech_telnetThis module exploits a stack buffer overflow in GoodTech Systems Telnet Server versions prior to 5.0.7. By sending an overly long string, an attacker can overwrite the buffer and control program execution. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2005-0768
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2005-0768
Products affected by CVE-2005-0768
- cpe:2.3:a:goodtech_systems:goodtech_telnet_server:4.0:*:windows_nt:*:*:*:*:*
- cpe:2.3:a:goodtech_systems:goodtech_telnet_server:5.0:*:windows_nt:*:*:*:*:*