Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7xw6-7f8j-hr4m

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

EPSS

Процентиль: 98%
0.58537
Средний

Связанные уязвимости

ubuntu
больше 20 лет назад

Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

redhat
больше 20 лет назад

Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

nvd
больше 20 лет назад

Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.

debian
больше 20 лет назад

Heap-based buffer overflow in the env_opt_add function in telnet.c for ...

EPSS

Процентиль: 98%
0.58537
Средний