Описание
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.2.2-11.3ubuntu4 |
devel | DNE | |
edgy | released | 1.2.2-11.3ubuntu4 |
feisty | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.4.3-5ubuntu0.6 |
devel | released | 1.6.dfsg.1-7 |
edgy | released | 1.4.3-9ubuntu1.5 |
feisty | released | 1.4.4-5ubuntu3.3 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | |
devel | not-affected | |
edgy | not-affected | |
feisty | not-affected | |
upstream | needs-triage |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
Heap-based buffer overflow in the env_opt_add function in telnet.c for ...
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
EPSS
7.5 High
CVSS2