Vulnerability CVE-2011-4862


Published: 2011-12-24   Modified: 2012-02-13

Description:
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, and Heimdal 1.5.1 and earlier allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
FreeBSD telnetd encrypt_key_id brute force
Nenad Stojanovsk...
12.01.2012
High
Cisco Ironport WSA telnetd Remote Code Execution
Glafkos Charalam...
23.10.2014

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

Vendor: Freebsd
Product: Freebsd 
Version:
9.0
8.2
8.1
8.0
7.3
Vendor: H5L
Product: Heimdal 
Version: 1.5.1;
Vendor: MIT
Product: Krb5-appl 
Version: 1.02;

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://xforce.iss.net/xforce/xfdb/71970
http://www.securitytracker.com/id?1026460
http://www.redhat.com/support/errata/RHSA-2011-1854.html
http://www.redhat.com/support/errata/RHSA-2011-1852.html
http://www.redhat.com/support/errata/RHSA-2011-1851.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:195
http://www.exploit-db.com/exploits/18280/
http://www.debian.org/security/2011/dsa-2375
http://www.debian.org/security/2011/dsa-2373
http://www.debian.org/security/2011/dsa-2372
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2011-008.txt
http://security.freebsd.org/patches/SA-11:08/telnetd.patch
http://security.freebsd.org/advisories/FreeBSD-SA-11:08.telnetd.asc
http://secunia.com/advisories/47441
http://secunia.com/advisories/47399
http://secunia.com/advisories/47397
http://secunia.com/advisories/47374
http://secunia.com/advisories/47373
http://secunia.com/advisories/47359
http://secunia.com/advisories/47357
http://secunia.com/advisories/47348
http://secunia.com/advisories/47341
http://osvdb.org/78020
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006120.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006119.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006118.html
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006117.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071640.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071627.html

Related CVE
CVE-2018-20217
A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U...
CVE-2017-7562
An authentication bypass flaw was found in the way krb5's certauth interface before 1.16.1 handled the validation of client certificates. A remote attacker able to communicate with the KDC could potentially use this flaw to impersonate arbitrary prin...
CVE-2018-5730
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string w...
CVE-2018-5729
MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to th...
CVE-2018-5710
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. The pre-defined function "strlen" is getting a "NULL" string as a parameter value in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the Key Distribution Center (KDC), which allows ...
CVE-2018-5709
An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data...
CVE-2017-15088
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applicatio...
CVE-2017-11462
Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.

Copyright 2019, cxsecurity.com

 

Back to Top