Lucene search

K
osvGoogleOSV:DSA-731-1
HistoryJun 02, 2005 - 12:00 a.m.

krb4 - buffer overflows

2005-06-0200:00:00
Google
osv.dev
6

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.94 High

EPSS

Percentile

98.7%

Several problems have been discovered in telnet clients that could be
exploited by malicious daemons the client connects to. The Common
Vulnerabilities and Exposures project identifies the following
problems:

  • CAN-2005-0468
    GaĂŤl Delalleau discovered a buffer overflow in the env_opt_add()
    function that allow a remote attacker to execute arbitrary code.

  • CAN-2005-0469
    GaĂŤl Delalleau discovered a buffer overflow in the handling of the
    LINEMODE suboptions in telnet clients. This can lead to the
    execution of arbitrary code when connected to a malicious server.

For the stable distribution (woody) these problems have been fixed in
version 1.1-8-2.4.

For the testing distribution (sarge) these problems have been fixed in
version 1.2.2-11.2.

For the unstable distribution (sid) these problems have been fixed in
version 1.2.2-11.2.

We recommend that you upgrade your krb4 packages.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.94 High

EPSS

Percentile

98.7%