Lucene search

K

Debian Security Advisory DSA 529-1 (netkit-telnet-ssl)

🗓️ 17 Jan 2008 00:00:00Reported by Copyright (C) 2008 E-Soft Inc.Type 
openvas
 openvas
🔗 plugins.openvas.org👁 8 Views

Debian Security Advisory DSA 529-1 (netkit-telnet-ssl) format string vulnerability in telnet-ss

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
FreeBSD Ports: SSLtelnet
4 Sep 200800:00
openvas
OpenVAS
FreeBSD Ports: SSLtelnet
4 Sep 200800:00
openvas
OpenVAS
Debian Security Advisory DSA 529-1 (netkit-telnet-ssl)
17 Jan 200800:00
openvas
Cvelist
CVE-2004-0640
9 Jul 200404:00
cvelist
CVE
CVE-2004-0640
6 Aug 200404:00
cve
CVE
CAN-2004-0640
6 Aug 202410:02
cve
Tenable Nessus
FreeBSD : Format string vulnerability in SSLtelnet (4aec9d58-ce7b-11d8-858d-000d610a3b12)
6 Jul 200400:00
nessus
Tenable Nessus
Debian DSA-529-1 : netkit-telnet-ssl - format string
29 Sep 200400:00
nessus
UbuntuCve
CVE-2004-0640
6 Aug 200400:00
ubuntucve
FreeBSD
Format string vulnerability in SSLtelnet
3 Apr 200300:00
freebsd
Rows per page
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.53218");
  script_version("2023-07-19T05:05:15+0000");
  script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-01-17 22:45:44 +0100 (Thu, 17 Jan 2008)");
  script_cve_id("CVE-2004-0640");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_name("Debian Security Advisory DSA 529-1 (netkit-telnet-ssl)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Debian Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB3\.0");
  script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20529-1");
  script_tag(name:"insight", value:"b0f discovered a format string vulnerability in netkit-telnet-ssl
which could potentially allow a remote attacker to cause the execution
of arbitrary code with the privileges of the telnet daemon (the
'telnetd' user by default).

For the current stable distribution (woody), this problem has been
fixed in version 0.17.17+0.1-2woody1.

For the unstable distribution (sid), this problem has been fixed in
version 0.17.24+0.1-2.

We recommend that you update your netkit-telnet-ssl package.");
  script_tag(name:"summary", value:"The remote host is missing an update to netkit-telnet-ssl
announced via advisory DSA 529-1.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution", value:"Please install the updated package(s).");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-deb.inc");

res = "";
report = "";
if((res = isdpkgvuln(pkg:"telnet-ssl", ver:"0.17.17+0.1-2woody1", rls:"DEB3.0")) != NULL) {
  report += res;
}
if((res = isdpkgvuln(pkg:"telnetd-ssl", ver:"0.17.17+0.1-2woody1", rls:"DEB3.0")) != NULL) {
  report += res;
}

if(report != "") {
  security_message(data:report);
} else if(__pkg_match) {
  exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jan 2008 00:00Current
6.7Medium risk
Vulners AI Score6.7
CVSS210
EPSS0.03447
8
.json
Report