Vulnerability Description
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ncsa | Telnet | All versions |
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.ascVendor Advisory
- ftp://patches.sgi.com/support/free/security/advisories/20050405-01-PPatch
- http://secunia.com/advisories/14745
- http://secunia.com/advisories/17899
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101665-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101671-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-57755-1PatchVendor Advisory
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-57761-1
- http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txtPatchVendor Advisory
- http://www.debian.de/security/2005/dsa-731
- http://www.debian.org/security/2005/dsa-697PatchVendor Advisory
- http://www.debian.org/security/2005/dsa-699PatchVendor Advisory
- http://www.debian.org/security/2005/dsa-703PatchVendor Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200503-36.xmlPatchVendor Advisory
- http://www.idefense.com/application/poi/display?id=220&type=vulnerabilitiesPatchVendor Advisory
FAQ
What is CVE-2005-0469?
CVE-2005-0469 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number ...
How severe is CVE-2005-0469?
CVE-2005-0469 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0469?
Check the references section above for vendor advisories and patch information. Affected products include: Ncsa Telnet.