7.5
CVSSv2

CVE-2005-0469

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote malicious users to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ncsa telnet

Vendor Advisories

Synopsis telnet security update Type/Severity Security Advisory: Important Topic Updated telnet packages that fix two buffer overflow vulnerabilities arenow availableThis update has been rated as having important security impact by the RedHat Security Response Team Description The telnet ...
Synopsis krb5 security update Type/Severity Security Advisory: Important Topic Updated krb5 packages which fix two buffer overflow vulnerabilities in theincluded Kerberos-aware telnet client are now availableThis update has been rated as having important security impact by the RedHat Security Response Team ...
Ga�l Delalleau discovered a buffer overflow in the env_opt_add() function of the Kerberos 4 and 5 telnet clients By sending specially crafted replies, a malicious telnet server could exploit this to execute arbitrary code with the privileges of the user running the telnet client (CVE-2005-0468) ...
A buffer overflow was discovered in the telnet client’s handling of the LINEMODE suboptions By sending a specially constructed reply containing a large number of SLC (Set Local Character) commands, a remote attacker (i e a malicious telnet server) could execute arbitrary commands with the privileges of the user running the telnet client (CAN- ...
Gaël Delalleau discovered a buffer overflow in the handling of the LINEMODE suboptions in telnet clients This can lead to the execution of arbitrary code when connected to a malicious server For the stable distribution (woody) this problem has been fixed in version 01717+01-2woody4 For the unstable distribution (sid) these problems have been ...
Several problems have been discovered in telnet clients that could be exploited by malicious daemons the client connects to The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-0468 Gaël Delalleau discovered a buffer overflow in the env_opt_add() function that allow a remote attacker to execute arb ...
Gaël Delalleau discovered a buffer overflow in the handling of the LINEMODE suboptions in telnet clients This can lead to the execution of arbitrary code when connected to a malicious server For the stable distribution (woody) this problem has been fixed in version 017-18woody3 For the unstable distribution (sid) this problem has been fixed in ...