{"vuid":"VU#994851","idnumber":"994851","name":"Microsoft Services for UNIX Telnet server is vulnerable to denial of service via memory leak","keywords":["Microsoft Services for UNIX 2.0","SFU","DoS","denial of service","Telnet services","MS01-039","Q301514","Q294380"],"overview":"The telnet server included in the Microsoft Services for Unix package contains a denial-of-service vulnerability that may cause the system to become unstable or crash.","clean_desc":"The telnet server included in the Microsoft Services for Unix (SFU) package contains a memory leak that can lead to excessive resource consumption on affected systems. This vulnerability affects Microsoft Windows NT 4.0 and Windows 2000 systems that have the SFU package installed. It does not affect the telnet server that ships with Windows NT 4.0 and Windows 2000.","impact":"By sending repeated requests to an affected Microsoft telnet server, attackers can consume all available memory resources, resulting in a denial-of-service condition.","resolution":"Microsoft has released the following patches to address this vulnerability Windows NT 4.0: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31601 \nWindows 2000: http://www.microsoft.com/Downloads/Release.asp?ReleaseID=31595","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported to Microsoft by Peter Grundl.","author":"This document was written by Jeffrey P. Lanza and is based on information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/MS01-039.asp","http://www.securityfocus.com/bid/3090"],"cveids":["CVE-2001-0505"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-07-24T20:49:43Z","publicdate":"2001-07-24T00:00:00Z","datefirstpublished":"2001-07-24T22:13:19Z","dateupdated":"2001-08-07T19:44:29Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"2","cam_population":"14","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.2525","cam_scorecurrentwidelyknown":"5.04","cam_scorecurrentwidelyknownexploited":"6.615","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.2525,"vulnote":null}