exploit-db-mirror/platforms/multiple/remote/19230
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

5 lines
No EOL
526 B
Text
Executable file

source: http://www.securityfocus.com/bid/288/info
Servers running PCAnywhere32 with TCP/IP networking are subject to a Denial of Service attack that will hang the server at 100% CPU utilization. A malicious user may initiate this DoS by connecting to tcp port 5631 on the PCAnywhere server input a large amount of data when prompted with "Please press <Enter>".
Connect to tcp 5631. At the Please press <Enter> prompt, transfer a large amount of data to the PCAnywhere server. This will peg the CPU utilization at 100%.