10

CVE-2011-4862

Exploit

Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GnuInetutils Version < 1.9
Heimdal ProjectHeimdal Version <= 1.5.1
MitKrb5-appl Version <= 1.0.2
FreebsdFreebsd Version >= 7.3 <= 9.0
FedoraprojectFedora Version15
FedoraprojectFedora Version16
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
DebianDebian Linux Version7.0
OpensuseOpensuse Version11.3
OpensuseOpensuse Version11.4
SuseLinux Enterprise Desktop Version10 Updatesp4 SwEdition-
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Server Version10 Updatesp2
SuseLinux Enterprise Server Version10 Updatesp3 SwEditionltss
SuseLinux Enterprise Server Version10 Updatesp4 SwEdition-
SuseLinux Enterprise Server Version11 Updatesp1 SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp1 SwEdition- SwPlatformvmware
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 92.41% 0.997
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

http://www.exploit-db.com/exploits/18280/
Third Party Advisory
Exploit
VDB Entry
http://www.securitytracker.com/id?1026460
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1026463
Third Party Advisory
VDB Entry