Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-0469

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2005-0469
Last Modified 21 Aug 2010 12:26:11
Published 02 May 2005 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-0469

Summary

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

Vulnerable Systems

Application

  • Ncsa Telnet


References

CERT-VN - VU#291924

REDHAT - RHSA-2005:330

REDHAT - RHSA-2005:327

IDEFENSE - 20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability

GENTOO - GLSA-200503-36

DEBIAN - DSA-703

DEBIAN - DSA-699

DEBIAN - DSA-697

CONFIRM - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt

SUNALERT - 57755

SGI - 20050405-01-P

UBUNTU - USN-224-1

BID - 12918

DEBIAN - DSA-731

SUNALERT - 57761

SUNALERT - 101671

SUNALERT - 101665

SECUNIA - 17899

SECUNIA - 14745

FREEBSD - FreeBSD-SA-05:01.telnet

MANDRAKE - MDKSA-2005:061


Last Updated: 27 May 2016 10:39:48