Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2011-12-25 01:55
Updated : 2024-02-04 17:54
NVD link : CVE-2011-4862
Mitre link : CVE-2011-4862
CVE.ORG link : CVE-2011-4862
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
opensuse
- opensuse
mit
- krb5-appl
gnu
- inetutils
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
- linux_enterprise_desktop
freebsd
- freebsd
heimdal_project
- heimdal
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')