Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title [sparc-only] telnetd-ssl AYT buffer overflow
Informations
Name DSA-075 First vendor Publication 2001-08-14
Vendor Debian Last vendor Modification 2001-08-14
Severity (Vendor) N/A Revision 2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

This is a followup to the problem described in DSA 075-1. Please read the original advisory to find out more about the security problem. This advisory and upload only fixes a problem with binary packages for sparc that were mistakenly linked to the wrong library.

We recommend that you upgrade your netkit-telnet-ssl packages immediately if you are running a sparc system.

wget url will fetch the file for you dpkg -i file.deb will install the referenced file.

If you are using the apt-get package manager, use the line for sources.list as given below:

apt-get update will update the internal database apt-get upgrade will install corrected packages

You may use an automated update by adding the resources from the footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato

Original Source

Url : http://www.debian.org/security/2001/dsa-075

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1828
 
Oval ID: oval:org.mitre.oval:def:1828
Title: Buffer Overflow in "in.telnetd"or "telnetd"Process
Description: Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Family: unix Class: vulnerability
Reference(s): CVE-2001-0554
Version: 1
Platform(s): Sun Solaris 7
Sun Solaris 8
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 5
Application 3
Os 1
Os 38
Os 5
Os 14
Os 9
Os 1
Os 10

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200410-03 (netkit-telnetd)
File : nvt/glsa_200410_03.nasl
2008-01-17 Name : Debian Security Advisory DSA 070-1 (netkit-telnet)
File : nvt/deb_070_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 075-1 (netkit-telnet-ssl)
File : nvt/deb_075_1.nasl
2005-11-03 Name : TESO in.telnetd buffer overflow
File : nvt/teso_telnet.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
809 Multiple BSD Telnet telrcv Functin Remote Command Execution

A remote overflow exists in multiple BSD-based telnet daemons. The 'telrcv' function fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 bsd exploit client finishing
RuleID : 1253-community - Revision : 24 - Type : PROTOCOL-TELNET
2014-01-10 bsd exploit client finishing
RuleID : 1253 - Revision : 24 - Type : PROTOCOL-TELNET
2014-01-10 bsd telnet exploit response
RuleID : 1252-community - Revision : 25 - Type : PROTOCOL-TELNET
2014-01-10 bsd telnet exploit response
RuleID : 1252 - Revision : 25 - Type : PROTOCOL-TELNET

Nessus® Vulnerability Scanner

Date Description
2004-10-06 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200410-03.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-070.nasl - Type : ACT_GATHER_INFO
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-075.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2001-068.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2001-093.nasl - Type : ACT_GATHER_INFO
2002-06-05 Name : The remote device is missing a vendor-supplied security patch.
File : CSCdw19195.nasl - Type : ACT_GATHER_INFO
2001-07-24 Name : The remote telnet server may be vulnerable to a buffer overflow attack.
File : teso_telnet.nasl - Type : ACT_DESTRUCTIVE_ATTACK

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:25:28
  • Multiple Updates