Revision Date: | 2013-04-29 | Version: | 12 |
Title: | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated. |
Description: | Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated. |
Family: | unix | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2005-0468
|
Platform(s): | CentOS Linux 3 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4
| Product(s): | |
Definition Synopsis |
OS Section: RHEL3, CentOS3 RHEL3 or CentOS3
The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND Configuration section
krb5-workstation is earlier than 0:1.2.7-42
OR krb5 is earlier than 0:1.2.7-42
OR krb5-libs is earlier than 0:1.2.7-42
OR telnet is earlier than 1:0.17-26.EL3.2
OR krb5-server is earlier than 0:1.2.7-42
OR telnet-server is earlier than 1:0.17-26.EL3.2
OR krb5-devel is earlier than 0:1.2.7-42
OR OS Section: RHEL4, CentOS4, Oracle Linux 4
RHEL4, CentOS4 or Oracle Linux 4
The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND Configuration section
krb5-workstation is earlier than 0:1.3.4-12
OR krb5 is earlier than 0:1.3.4-12
OR krb5-libs is earlier than 0:1.3.4-12
OR telnet is earlier than 1:0.17-31.EL4.2
OR krb5-server is earlier than 0:1.3.4-12
OR telnet-server is earlier than 1:0.17-31.EL4.2
OR krb5-devel is earlier than 0:1.3.4-12
|