7.5
CVSSv2

CVE-2005-0468

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote malicious users to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

Vulnerable Product Search on Vulmon Subscribe to Product

ncsa telnet c

Vendor Advisories

Ga�l Delalleau discovered a buffer overflow in the env_opt_add() function of the Kerberos 4 and 5 telnet clients By sending specially crafted replies, a malicious telnet server could exploit this to execute arbitrary code with the privileges of the user running the telnet client (CVE-2005-0468) ...
Synopsis telnet security update Type/Severity Security Advisory: Important Topic Updated telnet packages that fix two buffer overflow vulnerabilities arenow availableThis update has been rated as having important security impact by the RedHat Security Response Team Description The telnet ...
Synopsis krb5 security update Type/Severity Security Advisory: Important Topic Updated krb5 packages which fix two buffer overflow vulnerabilities in theincluded Kerberos-aware telnet client are now availableThis update has been rated as having important security impact by the RedHat Security Response Team ...
Several problems have been discovered in telnet clients that could be exploited by malicious daemons the client connects to The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-0468 Gaël Delalleau discovered a buffer overflow in the env_opt_add() function that allow a remote attacker to execute arb ...

Exploits

source: wwwsecurityfocuscom/bid/12919/info Multiple vendors' Telnet client applications are reported prone to a remote buffer-overflow vulnerability This vulnerability reportedly occurs in the 'env_opt_add()' function in the 'telnetc' source file, which is apparently common source for all the affected vendors A remote attacker may exp ...