Vulnerability Name: | CCN-1124 | ||||||
Published: | 1998-06-17 | ||||||
Updated: | 1998-06-17 | ||||||
Summary: | A vulnerability in the rlogin service distributed with BSDI could allow a remote attacker with control of a DNS (Domain Name System) server to overflow an internal buffer in rlogind and execute arbitrary code on the system with root privileges. | ||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: Repent Security Incorporated (RSI) RSI.0004a.06-17-98.BSDI.RLOGIND BSDI rlogind Source: CCN Type: CIAC Information Bulletin I-063 RSI BSDI rlogind Vulnerability Source: XF Type: UNKNOWN bsdi-rlogind(1124) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |