Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2005-0469

Опубликовано: 01 окт. 2025
Источник: msrc
EPSS Средний

Описание

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

EPSS

Процентиль: 98%
0.4782
Средний

Связанные уязвимости

ubuntu
почти 21 год назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

redhat
почти 21 год назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

nvd
почти 21 год назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

debian
почти 21 год назад

Buffer overflow in the slc_add_reply function in various BSD-based Tel ...

github
почти 4 года назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

EPSS

Процентиль: 98%
0.4782
Средний