Nessus Plugin #17666

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200503-36] netkit-telnetd: Buffer overflow

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2005 Michel Arboi
Summary:
netkit-telnetd: Buffer overflow
Version:
$Revision: 1.1 $
Cve_id:
CAN-2005-0469
Bugtraq_id:
-
Xrefs:
GLSA:200503-36
Description:
The remote host is affected by the vulnerability described in GLSA-200503-36
(netkit-telnetd: Buffer overflow)


A buffer overflow has been identified in the slc_add_reply()
function of netkit-telnetd client, where a large number of SLC commands
can overflow a fixed size buffer.

Impact

Successful explotation would require a vulnerable user to connect
to an attacker-controlled host using telnet, potentially executing
arbitrary code with the permissions of the telnet user.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0469
http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities


Solution:
All netkit-telnetd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/netkit-telnetd-0.17-r6"


Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.