Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0469

Опубликовано: 02 мая 2005
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 7.5

Описание

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

РелизСтатусПримечание
dapper

released

0.7.1-1ubuntu3
devel

released

0.7.1-1ubuntu3
edgy

released

0.7.1-1ubuntu3
feisty

released

0.7.1-1ubuntu3
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1.2.2-11.3ubuntu4
devel

DNE

edgy

released

1.2.2-11.3ubuntu4
feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

1.4.3-5ubuntu0.6
devel

released

1.6.dfsg.1-7
edgy

released

1.4.3-9ubuntu1.5
feisty

released

1.4.4-5ubuntu3.3
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.17-32
devel

released

0.17-32
edgy

released

0.17-32
feisty

released

0.17-32
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

0.17.24+0.1-9
devel

released

0.17.24+0.1-9
edgy

released

0.17.24+0.1-9
feisty

released

0.17.24+0.1-9
upstream

needs-triage

Показывать по

EPSS

Процентиль: 98%
0.4782
Средний

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

nvd
больше 20 лет назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

debian
больше 20 лет назад

Buffer overflow in the slc_add_reply function in various BSD-based Tel ...

github
больше 3 лет назад

Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

fstec
больше 10 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 98%
0.4782
Средний

7.5 High

CVSS2