VID |
29131 |
Severity |
30 |
Port |
23 |
Protocol |
TCP |
Class |
TELNET |
Detailed Description |
The RPC-3 Telnet daemon is vulnerable to an authentication bypass vulnerability. Bay Technical Associates' RPC-3 Telnet Host is a telnet daemon, used by many hardware appliances, mostly for power supplies solutions. Bay Technical Associates RPC-3 Telnet Host F3.05 - Revision and possibly earlier versions could allow a remote attacker to bypass authentication. By pressing the escape and enter keys at the username prompt, a remote attacker could bypass authentication and gain administrative access. A successful attack could allow the attacker to carry out a denial of service attack against a machine using the power supply by shutting down the device.
* References: http://www.securityfocus.com/archive/1/394726 http://www.baytechdcd.com/cgi-private/prodlist?show=RPC3
* Platforms Affected: Bay Technical Associates, RPC-3 Telnet Host - Revision F3.05 and earlier versions |
Recommendation |
No upgrade or patch available as of March 2006. Restrict access to trusted hosts only.
It is reported that RPC-3 Telnet Host - Revision F5.10.4 is not affected by this issue. |
Related URL |
CVE-2005-0957 (CVE) |
Related URL |
12955 (SecurityFocus) |
Related URL |
19921 (ISS) |
|