CVE-2011-4862
FreeBSD - Telnet Service Encryption Key ID Buffer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
6Exploited in Wild
-Decision
Descriptions
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
Desbordamiento de búfer basado en pila en libtelnet/encrypt.c en telnetd en FreeBSD v7.3 hasta v9.0, MIT Kerberos Version v5 Applications (también conocido como krb5-appl) v1.0.2 y anteriores, y Heimdal v1.5.1 y anteriores, permite a atacantes remotos ejecutar código de su elección a través de una clave de cifrado larga, como fue explotado en Diciembre 2011.
Detect telnet services vulnerable to the encrypt option Key ID overflow (BSD-derived telnetd).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-12-19 CVE Reserved
- 2011-12-25 CVE Published
- 2011-12-26 First Exploit
- 2024-08-07 CVE Updated
- 2024-11-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (50)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2011-12/0172.html | Broken Link | |
http://osvdb.org/78020 | Broken Link | |
http://secunia.com/advisories/46239 | Third Party Advisory | |
http://secunia.com/advisories/47341 | Third Party Advisory | |
http://secunia.com/advisories/47348 | Third Party Advisory | |
http://secunia.com/advisories/47357 | Third Party Advisory | |
http://secunia.com/advisories/47359 | Third Party Advisory | |
http://secunia.com/advisories/47373 | Third Party Advisory | |
http://secunia.com/advisories/47374 | Third Party Advisory | |
http://secunia.com/advisories/47397 | Third Party Advisory | |
http://secunia.com/advisories/47399 | Third Party Advisory | |
http://secunia.com/advisories/47441 | Third Party Advisory | |
http://www.securitytracker.com/id?1026460 | Third Party Advisory | |
http://www.securitytracker.com/id?1026463 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71970 | Third Party Advisory | |
https://www.rapid7.com/blog/post/2011/12/28/more-fun-with-bsd-derived-telnet-daemons |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/18369 | 2012-01-14 | |
https://www.exploit-db.com/exploits/18368 | 2012-01-14 | |
https://www.exploit-db.com/exploits/18280 | 2011-12-26 | |
https://github.com/hdbreaker/GO-CVE-2011-4862 | 2017-02-02 | |
https://github.com/kpawar2410/CVE-2011-4862 | 2020-02-12 | |
http://www.exploit-db.com/exploits/18280 | 2024-08-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Inetutils Search vendor "Gnu" for product "Inetutils" | < 1.9 Search vendor "Gnu" for product "Inetutils" and version " < 1.9" | - |
Affected
| ||||||
Heimdal Project Search vendor "Heimdal Project" | Heimdal Search vendor "Heimdal Project" for product "Heimdal" | <= 1.5.1 Search vendor "Heimdal Project" for product "Heimdal" and version " <= 1.5.1" | - |
Affected
| ||||||
Mit Search vendor "Mit" | Krb5-appl Search vendor "Mit" for product "Krb5-appl" | <= 1.0.2 Search vendor "Mit" for product "Krb5-appl" and version " <= 1.0.2" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | >= 7.3 <= 9.0 Search vendor "Freebsd" for product "Freebsd" and version " >= 7.3 <= 9.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 15 Search vendor "Fedoraproject" for product "Fedora" and version "15" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 16 Search vendor "Fedoraproject" for product "Fedora" and version "16" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.3 Search vendor "Opensuse" for product "Opensuse" and version "11.3" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.4 Search vendor "Opensuse" for product "Opensuse" and version "11.4" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Desktop Search vendor "Suse" for product "Linux Enterprise Desktop" | 10 Search vendor "Suse" for product "Linux Enterprise Desktop" and version "10" | sp4 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Desktop Search vendor "Suse" for product "Linux Enterprise Desktop" | 11 Search vendor "Suse" for product "Linux Enterprise Desktop" and version "11" | sp1 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 9 Search vendor "Suse" for product "Linux Enterprise Server" and version "9" | - |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 10 Search vendor "Suse" for product "Linux Enterprise Server" and version "10" | sp2 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 10 Search vendor "Suse" for product "Linux Enterprise Server" and version "10" | sp3, ltss |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 10 Search vendor "Suse" for product "Linux Enterprise Server" and version "10" | sp4 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 11 Search vendor "Suse" for product "Linux Enterprise Server" and version "11" | sp1 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Server Search vendor "Suse" for product "Linux Enterprise Server" | 11 Search vendor "Suse" for product "Linux Enterprise Server" and version "11" | sp1, vmware |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Software Development Kit Search vendor "Suse" for product "Linux Enterprise Software Development Kit" | 10 Search vendor "Suse" for product "Linux Enterprise Software Development Kit" and version "10" | sp4 |
Affected
| ||||||
Suse Search vendor "Suse" | Linux Enterprise Software Development Kit Search vendor "Suse" for product "Linux Enterprise Software Development Kit" | 11 Search vendor "Suse" for product "Linux Enterprise Software Development Kit" and version "11" | sp1 |
Affected
|