Lucene search

K
saintSAINT CorporationSAINT:2E667FA9EE1CC48C054B8BF1D1337065
HistoryFeb 11, 2012 - 12:00 a.m.

Telnetd Encryption Key ID Code Execution

2012-02-1100:00:00
SAINT Corporation
my.saintcorporation.com
50

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%

Added: 02/11/2012
CVE: CVE-2011-4862
BID: 51182
OSVDB: 78020

Background

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection.

Problem

The flaw is caused due to a boundary error within the “encrypt_keyid()” function (libtelnet/encrypt.c). This can be exploited to cause a buffer overflow via a long encryption key.

Resolution

Apply the vendor supplied patch for the target system or update FreeBSD/krb5.

References

<http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt&gt;
<http://thexploit.com/secdev/a-textbook-buffer-overflow-a-look-at-the-freebsd-telnetd-code/&gt;

Limitations

This exploit has been tested against telnetd on FreeBSD 8.0, FreeBSD 8.2, NetBSD 5.1 and Debian 6.0.2 Heimdal Server 1.5.

Platforms

FreeBSD 8.0
FreeBSD 8.1
FreeBSD 8.2
NetBSD 5.1
Linux / Debian

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%