Podatność CVE-2011-4862


Publikacja: 2011-12-24   Modyfikacja: 2012-02-13

Opis:
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, and Heimdal 1.5.1 and earlier allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
Med.
FreeBSD telnetd encrypt_key_id brute force
Nenad Stojanovsk...
12.01.2012
High
Cisco Ironport WSA telnetd Remote Code Execution
Glafkos Charalam...
23.10.2014

Typ:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
10/10
10/10
10/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Pełny
Pełny
Pełny
Affected software
MIT -> Krb5-appl 
H5L -> Heimdal 
Freebsd -> Freebsd 

 Referencje:
http://xforce.iss.net/xforce/xfdb/71970
http://www.securitytracker.com/id?1026460
http://www.redhat.com/support/errata/RHSA-2011-1854.html
http://www.redhat.com/support/errata/RHSA-2011-1852.html
http://www.redhat.com/support/errata/RHSA-2011-1851.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:195
http://www.exploit-db.com/exploits/18280/
http://www.debian.org/security/2011/dsa-2375
http://www.debian.org/security/2011/dsa-2373
http://www.debian.org/security/2011/dsa-2372
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2011-008.txt
http://security.freebsd.org/patches/SA-11:08/telnetd.patch
http://security.freebsd.org/advisories/FreeBSD-SA-11:08.telnetd.asc
http://secunia.com/advisories/47441
http://secunia.com/advisories/47399
http://secunia.com/advisories/47397
http://secunia.com/advisories/47374
http://secunia.com/advisories/47373
http://secunia.com/advisories/47359
http://secunia.com/advisories/47357
http://secunia.com/advisories/47348
http://secunia.com/advisories/47341
http://osvdb.org/78020
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006120.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006119.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006118.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006117.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071640.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071627.html

Copyright 2024, cxsecurity.com

 

Back to Top