Korean
<< Back
VID 29131
Severity 30
Port 23
Protocol TCP
Class TELNET
Detailed Description The RPC-3 Telnet daemon is vulnerable to an authentication bypass vulnerability. Bay Technical Associates' RPC-3 Telnet Host is a telnet daemon, used by many hardware appliances, mostly for power supplies solutions. Bay Technical Associates RPC-3 Telnet Host F3.05 - Revision and possibly earlier versions could allow a remote attacker to bypass authentication. By pressing the escape and enter keys at the username prompt, a remote attacker could bypass authentication and gain administrative access. A successful attack could allow the attacker to carry out a denial of service attack against a machine using the power supply by shutting down the device.

* References:
http://www.securityfocus.com/archive/1/394726
http://www.baytechdcd.com/cgi-private/prodlist?show=RPC3

* Platforms Affected:
Bay Technical Associates, RPC-3 Telnet Host - Revision F3.05 and earlier versions
Recommendation No upgrade or patch available as of March 2006. Restrict access to trusted hosts only.

It is reported that RPC-3 Telnet Host - Revision F5.10.4 is not affected by this issue.
Related URL CVE-2005-0957 (CVE)
Related URL 12955 (SecurityFocus)
Related URL 19921 (ISS)