Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
20 Nov 2024, 23:35
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc - Broken Link, Patch, Vendor Advisory | |
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc - Broken Link | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P - Broken Link | |
References | () ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt - Broken Link | |
References | () http://archives.neohapsis.com/archives/hp/2001-q4/0014.html - Broken Link | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 - Broken Link | |
References | () http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml - Broken Link | |
References | () http://online.securityfocus.com/advisories/3476 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://online.securityfocus.com/archive/1/199496 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://online.securityfocus.com/archive/1/199541 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://online.securityfocus.com/archive/1/203000 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt - Broken Link | |
References | () http://www.cert.org/advisories/CA-2001-21.html - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.ciac.org/ciac/bulletins/l-131.shtml - Broken Link | |
References | () http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml - Third Party Advisory | |
References | () http://www.debian.org/security/2001/dsa-070 - Third Party Advisory | |
References | () http://www.debian.org/security/2001/dsa-075 - Third Party Advisory | |
References | () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html - Broken Link | |
References | () http://www.osvdb.org/809 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2001-099.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2001-100.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/197804 - Exploit, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/3064 - Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6875 - Third Party Advisory, VDB Entry |
21 Jan 2022, 14:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:* | |
CWE | CWE-120 | |
References | (CALDERA) http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/3064 - Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (CISCO) http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml - Third Party Advisory | |
References | (BUGTRAQ) http://online.securityfocus.com/archive/1/199496 - Broken Link, Third Party Advisory, VDB Entry | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/6875 - Third Party Advisory, VDB Entry | |
References | (CIAC) http://www.ciac.org/ciac/bulletins/l-131.shtml - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2001-099.html - Third Party Advisory | |
References | (BUGTRAQ) http://online.securityfocus.com/archive/1/199541 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MANDRAKE) http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3 - Broken Link | |
References | (FREEBSD) ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc - Broken Link, Patch, Vendor Advisory | |
References | (NETBSD) ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc - Broken Link | |
References | (DEBIAN) http://www.debian.org/security/2001/dsa-070 - Third Party Advisory | |
References | (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 - Broken Link | |
References | (COMPAQ) http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml - Broken Link | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/197804 - Exploit, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html - Broken Link | |
References | (HP) http://archives.neohapsis.com/archives/hp/2001-q4/0014.html - Broken Link | |
References | (DEBIAN) http://www.debian.org/security/2001/dsa-075 - Third Party Advisory | |
References | (OSVDB) http://www.osvdb.org/809 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2001-100.html - Third Party Advisory | |
References | (BUGTRAQ) http://online.securityfocus.com/archive/1/203000 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CALDERA) ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt - Broken Link | |
References | (IBM) http://online.securityfocus.com/advisories/3476 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SGI) ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P - Broken Link |
Information
Published : 2001-08-14 04:00
Updated : 2024-11-20 23:35
NVD link : CVE-2001-0554
Mitre link : CVE-2001-0554
CVE.ORG link : CVE-2001-0554
JSON object : View
Products Affected
mit
- kerberos
- kerberos_5
sun
- sunos
- solaris
debian
- debian_linux
netkit
- linux_netkit
netbsd
- netbsd
sgi
- irix
ibm
- aix
openbsd
- openbsd
freebsd
- freebsd
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')