Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-0488

Опубликовано: 14 июн. 2005
Источник: debian
EPSS Средний

Описание

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
krb4unfixedpackage
krb4no-dsawoodypackage
krb4no-dsasargepackage
krb5fixed1.8.3+dfsg-4package
krb5no-dsawoodypackage
krb5no-dsasargepackage
netkit-telnetnot-affectedpackage

Примечания

  • telnet code was removed earlier than 1.8.3, but that's the version that was available to check

EPSS

Процентиль: 93%
0.10248
Средний

Связанные уязвимости

ubuntu
около 20 лет назад

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.

redhat
около 20 лет назад

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.

nvd
около 20 лет назад

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.

github
больше 3 лет назад

Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.

fstec
около 20 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 93%
0.10248
Средний