Nessus Plugin #14912
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[DSA075] DSA-075-1 netkit-telnet-ssl
- Family:
- Debian Local Security Checks
- Category:
- infos
- Copyright:
- This script is (C) 2004 Michel Arboi
- Summary:
- DSA-075-1 netkit-telnet-ssl
- Version:
- $Revision: 1.4 $
- Cve_id:
- CVE-2001-0554
- Bugtraq_id:
- -
- Xrefs:
- DSA:075
- Description:
The telnet daemon contained in the netkit-telnet-ssl_0.16.3-1 package in
the 'stable' (potato) distribution of Debian GNU/Linux is vulnerable to an
exploitable overflow in its output handling.
The original bug was found by <scut@nb.in-berlin.de>, and announced to
bugtraq on Jul 18 2001. At that time, netkit-telnet versions after 0.14 were
not believed to be vulnerable.
On Aug 10 2001, zen-parse posted an advisory based on the same problem, for
all netkit-telnet versions below 0.17.
More details can be found on
SecurityFocus.
As Debian uses the 'telnetd' user to run in.telnetd, this is not a remote
root compromise on Debian systems
the 'telnetd' user can be compromised.
We strongly advise you update your netkit-telnet-ssl packages to the versions
listed below.
Solution : http://www.debian.org/security/2001/dsa-075
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.