Several problems have been discovered in telnet clients that could be exploited by malicious daemons the client connects to. The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-0468 Gaël Delalleau discovered a buffer overflow in the env_opt_add() function that allow a remote attacker to execute arbitrary code. CAN-2005-0469 Gaël Delalleau discovered a buffer overflow in the handling of the LINEMODE suboptions in telnet clients. This can lead to the execution of arbitrary code when connected to a malicious server. For the stable distribution (woody) these problems have been fixed in version 1.1-8-2.4. For the testing distribution (sarge) these problems have been fixed in version 1.2.2-11.2. For the unstable distribution (sid) these problems have been fixed in version 1.2.2-11.2. We recommend that you upgrade your krb4 packages.
Several problems have been discovered in telnet clients that could be exploited by malicious daemons the client connects to. The Common Vulnerabilities and Exposures project identifies the following problems:
Gaël Delalleau discovered a buffer overflow in the env_opt_add() function that allow a remote attacker to execute arbitrary code.
Gaël Delalleau discovered a buffer overflow in the handling of the LINEMODE suboptions in telnet clients. This can lead to the execution of arbitrary code when connected to a malicious server.
For the stable distribution (woody) these problems have been fixed in version 1.1-8-2.4.
For the testing distribution (sarge) these problems have been fixed in version 1.2.2-11.2.
For the unstable distribution (sid) these problems have been fixed in version 1.2.2-11.2.
We recommend that you upgrade your krb4 packages.
MD5 checksums of the listed files are available in the original advisory.