{"vuid":"VU#215259","idnumber":"215259","name":"Microsoft Windows 2000 Telnet Service contains handle leak","keywords":["Microsoft Windows 2000","telnet service","DoS","denial of service","handle leak","multiple session","terminate session","MS01-031"],"overview":"The Microsoft Windows 2000 Telnet Service contains a denial-of-service vulnerability that allows remote attackers to disrupt the telnet service on affected servers.","clean_desc":"The Microsoft Windows 2000 Telnet Service contains a resource starvation vulnerability that prevents the server from releasing handles when telnet sessions are terminated in a specific manner. If a sufficiently large number of session requests are established and then terminated in this manner, it is possible to consume all available handle resources, resulting in a denial-of-service attack against all services offered by the victim server.","impact":"This vulnerability allows a remote attacker to disrupt or crash affected Windows 2000 servers, resulting in a denial-of-service condition.","resolution":"Apply a patch from your vendor Microsoft has released a patch for this vulnerability; for further information, please consult the systems affected section below.","workarounds":"Disable telnet service Sites that do not require the Windows 2000 Telnet Service may disable it to prevent exploitation of this vulnerability.","sysaffected":"","thanks":"","author":"This document was written by Jeffrey P. Lanza and is based on information provided by Microsoft.","public":["http://www.microsoft.com/technet/security/bulletin/ms01-031.asp","http://www.microsoft.com/Downloads/Release.asp?ReleaseID=30508","http://www.securityfocus.com/bid/2844"],"cveids":["CVE-2001-0346"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-06-13T13:29:37Z","publicdate":"2001-06-07T00:00:00Z","datefirstpublished":"2001-09-18T22:16:19Z","dateupdated":"2001-09-18T23:27:16Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"7","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"11.8125","cam_scorecurrentwidelyknown":"13.78125","cam_scorecurrentwidelyknownexploited":"17.71875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":11.8125,"vulnote":null}