Oval Definition:oval:org.mitre.oval:def:9640
Revision Date:2013-04-29Version:12
Title:Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
Description:Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
Family:unixClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2005-0468
Platform(s):CentOS Linux 3
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 3
Red Hat Enterprise Linux 4
Product(s):
Definition Synopsis
  • OS Section: RHEL3, CentOS3
  • RHEL3 or CentOS3
  • The operating system installed on the system is Red Hat Enterprise Linux 3
  • OR CentOS Linux 3.x
  • AND Configuration section
  • krb5-workstation is earlier than 0:1.2.7-42
  • OR krb5 is earlier than 0:1.2.7-42
  • OR krb5-libs is earlier than 0:1.2.7-42
  • OR telnet is earlier than 1:0.17-26.EL3.2
  • OR krb5-server is earlier than 0:1.2.7-42
  • OR telnet-server is earlier than 1:0.17-26.EL3.2
  • OR krb5-devel is earlier than 0:1.2.7-42
  • OR OS Section: RHEL4, CentOS4, Oracle Linux 4
  • RHEL4, CentOS4 or Oracle Linux 4
  • The operating system installed on the system is Red Hat Enterprise Linux 4
  • OR CentOS Linux 4.x
  • OR Oracle Linux 4.x
  • AND Configuration section
  • krb5-workstation is earlier than 0:1.3.4-12
  • OR krb5 is earlier than 0:1.3.4-12
  • OR krb5-libs is earlier than 0:1.3.4-12
  • OR telnet is earlier than 1:0.17-31.EL4.2
  • OR krb5-server is earlier than 0:1.3.4-12
  • OR telnet-server is earlier than 1:0.17-31.EL4.2
  • OR krb5-devel is earlier than 0:1.3.4-12
  • BACK