Lucene search

K
saintSAINT CorporationSAINT:9BB5708972A26A51904B1BC21D31E721
HistoryFeb 11, 2012 - 12:00 a.m.

Telnetd Encryption Key ID Code Execution

2012-02-1100:00:00
SAINT Corporation
download.saintcorporation.com
96

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.8%

Added: 02/11/2012
CVE: CVE-2011-4862
BID: 51182
OSVDB: 78020

Background

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection.

Problem

The flaw is caused due to a boundary error within the “encrypt_keyid()” function (libtelnet/encrypt.c). This can be exploited to cause a buffer overflow via a long encryption key.

Resolution

Apply the vendor supplied patch for the target system or update FreeBSD/krb5.

References

<http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2011-008.txt&gt;
<http://thexploit.com/secdev/a-textbook-buffer-overflow-a-look-at-the-freebsd-telnetd-code/&gt;

Limitations

This exploit has been tested against telnetd on FreeBSD 8.0, FreeBSD 8.2, NetBSD 5.1 and Debian 6.0.2 Heimdal Server 1.5.

Platforms

FreeBSD 8.0
FreeBSD 8.1
FreeBSD 8.2
NetBSD 5.1
Linux / Debian

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.8%