Vulnerability CVE-2011-4862


Published: 2011-12-24   Modified: 2012-02-13

Description:
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, and Heimdal 1.5.1 and earlier allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
FreeBSD telnetd encrypt_key_id brute force
Nenad Stojanovsk...
12.01.2012
High
Cisco Ironport WSA telnetd Remote Code Execution
Glafkos Charalam...
23.10.2014

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
MIT -> Krb5-appl 
H5L -> Heimdal 
Freebsd -> Freebsd 

 References:
http://xforce.iss.net/xforce/xfdb/71970
http://www.securitytracker.com/id?1026460
http://www.redhat.com/support/errata/RHSA-2011-1854.html
http://www.redhat.com/support/errata/RHSA-2011-1852.html
http://www.redhat.com/support/errata/RHSA-2011-1851.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:195
http://www.exploit-db.com/exploits/18280/
http://www.debian.org/security/2011/dsa-2375
http://www.debian.org/security/2011/dsa-2373
http://www.debian.org/security/2011/dsa-2372
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2011-008.txt
http://security.freebsd.org/patches/SA-11:08/telnetd.patch
http://security.freebsd.org/advisories/FreeBSD-SA-11:08.telnetd.asc
http://secunia.com/advisories/47441
http://secunia.com/advisories/47399
http://secunia.com/advisories/47397
http://secunia.com/advisories/47374
http://secunia.com/advisories/47373
http://secunia.com/advisories/47359
http://secunia.com/advisories/47357
http://secunia.com/advisories/47348
http://secunia.com/advisories/47341
http://osvdb.org/78020
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006120.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006119.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006118.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006117.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071640.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071627.html

Copyright 2022, cxsecurity.com

 

Back to Top