漏洞监测平台
- by GPT & AIGC
首页
(current)
最新POC
API
数据统计
(Coming soon)
关于
Search
漏洞详情: CVE-2005-0469
漏洞标题
NVD 暂无描述信息
来源:NVD
多个Telnet客户端slc_add_reply() 缓冲区溢出漏洞
来源:CNNVD
漏洞描述
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
来源:NVD
TELNET协议允许通过Internet连接到虚拟网络终端上。 多个TELNET协议客户端的实现在处理telnet子协商选项时存在缓冲区溢出漏洞,如果用户使用有漏洞的客户端程序连接访问恶意telnet服务器,可能导致在客户端机器上执行恶意指令。
来源:CNNVD
在多个基于 BSD 的 Telnet 客户端的 slc_add_reply 函数中,当处理 LINEMODE 子选项时,Buffer overflow 允许远程攻击者通过包含大量 Set Local Character (SLC) 命令的回复来执行任意代码。
来源:神龙机器人
漏洞评分(CVSS)
NVD 暂无评分
来源:NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:神龙机器人, 准确率:N/A
漏洞类别
NVD 暂无漏洞类别信息
来源:NVD
授权问题
来源:CNNVD
相关链接
http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txt
x_refsource_CONFIRM
14745
third-party-advisory
x_refsource_SECUNIA
17899
third-party-advisory
x_refsource_SECUNIA
57761
vendor-advisory
x_refsource_SUNALERT
57755
vendor-advisory
x_refsource_SUNALERT
12918
vdb-entry
x_refsource_BID
101665
vendor-advisory
x_refsource_SUNALERT
101671
vendor-advisory
x_refsource_SUNALERT
DSA-703
vendor-advisory
x_refsource_DEBIAN
DSA-699
vendor-advisory
x_refsource_DEBIAN
DSA-731
vendor-advisory
x_refsource_DEBIAN
DSA-697
vendor-advisory
x_refsource_DEBIAN
USN-224-1
vendor-advisory
x_refsource_UBUNTU
VU#291924
third-party-advisory
x_refsource_CERT-VN
RHSA-2005:327
vendor-advisory
x_refsource_REDHAT
20050405-01-P
vendor-advisory
x_refsource_SGI
RHSA-2005:330
vendor-advisory
x_refsource_REDHAT
MDKSA-2005:061
vendor-advisory
x_refsource_MANDRAKE
GLSA-200503-36
vendor-advisory
x_refsource_GENTOO
FreeBSD-SA-05:01.telnet
vendor-advisory
x_refsource_FREEBSD
oval:org.mitre.oval:def:9708
vdb-entry
signature
x_refsource_OVAL
20050328 Multiple Telnet Client slc_add_reply() Buffer Overflow Vulnerability
third-party-advisory
x_refsource_IDEFENSE
https://nvd.nist.gov/vuln/detail/CVE-2005-0469