This module exploits a remote vulnerability that could allow an attacker to send a specially crafted IP message to an affected system causing a denial of service.
The logging function used by the Ultr@VNC server is affected by a limited buffer-overflow caused by two calls to strcat() which add a Windows error message to the output buffer causing the server to crash and stop responding to further connections. Use this DoS in combination with the 'Ultr@VNC client side exploit' and an ARP spoofing to impersonate the real server on the network.
This module shuts down the TYPSoft FTP Server because it fails to properly handle user-supplied malformed packets using for login the Anonymous user provided by default for the program