Vulnerability Description
Buffer overflow in the handle_packet function in mactelnet.c in the client in MAC-Telnet 0.4.3 and earlier allows remote TELNET servers to execute arbitrary code via a long string in an MT_CPTYPE_PASSSALT control packet.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mac-Telnet Project | Mac-Telnet | <= 0.4.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/92699
- https://github.com/haakonnessjoen/MAC-Telnet/commit/b69d11727d4f0f8cf719c79e3fb7Issue TrackingPatch
- https://github.com/haakonnessjoen/MAC-Telnet/pull/20Issue TrackingPatch
- http://www.securityfocus.com/bid/92699
- https://github.com/haakonnessjoen/MAC-Telnet/commit/b69d11727d4f0f8cf719c79e3fb7Issue TrackingPatch
- https://github.com/haakonnessjoen/MAC-Telnet/pull/20Issue TrackingPatch
FAQ
What is CVE-2016-7115?
CVE-2016-7115 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Buffer overflow in the handle_packet function in mactelnet.c in the client in MAC-Telnet 0.4.3 and earlier allows remote TELNET servers to execute arbitrary code via a long string in an MT_CPTYPE_PASS...
How severe is CVE-2016-7115?
CVE-2016-7115 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-7115?
Check the references section above for vendor advisories and patch information. Affected products include: Mac-Telnet Project Mac-Telnet.