// For flags

CVE-2011-4862

FreeBSD - Telnet Service Encryption Key ID Buffer Overflow

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

6
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.

Desbordamiento de búfer basado en pila en libtelnet/encrypt.c en telnetd en FreeBSD v7.3 hasta v9.0, MIT Kerberos Version v5 Applications (también conocido como krb5-appl) v1.0.2 y anteriores, y Heimdal v1.5.1 y anteriores, permite a atacantes remotos ejecutar código de su elección a través de una clave de cifrado larga, como fue explotado en Diciembre 2011.

Detect telnet services vulnerable to the encrypt option Key ID overflow (BSD-derived telnetd).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-12-19 CVE Reserved
  • 2011-12-25 CVE Published
  • 2011-12-26 First Exploit
  • 2024-08-07 CVE Updated
  • 2024-11-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (50)
URL Date SRC
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071627.html 2021-02-09
http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071640.html 2021-02-09
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006117.html 2021-02-09
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006118.html 2021-02-09
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006119.html 2021-02-09
http://lists.freebsd.org/pipermail/freebsd-security/2011-December/006120.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00002.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00004.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00005.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00007.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00010.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00011.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00014.html 2021-02-09
http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00015.html 2021-02-09
http://security.freebsd.org/advisories/FreeBSD-SA-11:08.telnetd.asc 2021-02-09
http://www.debian.org/security/2011/dsa-2372 2021-02-09
http://www.debian.org/security/2011/dsa-2373 2021-02-09
http://www.debian.org/security/2011/dsa-2375 2021-02-09
http://www.mandriva.com/security/advisories?name=MDVSA-2011:195 2021-02-09
http://www.redhat.com/support/errata/RHSA-2011-1851.html 2021-02-09
http://www.redhat.com/support/errata/RHSA-2011-1852.html 2021-02-09
http://www.redhat.com/support/errata/RHSA-2011-1853.html 2021-02-09
http://www.redhat.com/support/errata/RHSA-2011-1854.html 2021-02-09
https://access.redhat.com/security/cve/CVE-2011-4862 2011-12-28
https://bugzilla.redhat.com/show_bug.cgi?id=770325 2011-12-28
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gnu
Search vendor "Gnu"
Inetutils
Search vendor "Gnu" for product "Inetutils"
< 1.9
Search vendor "Gnu" for product "Inetutils" and version " < 1.9"
-
Affected
Heimdal Project
Search vendor "Heimdal Project"
Heimdal
Search vendor "Heimdal Project" for product "Heimdal"
<= 1.5.1
Search vendor "Heimdal Project" for product "Heimdal" and version " <= 1.5.1"
-
Affected
Mit
Search vendor "Mit"
Krb5-appl
Search vendor "Mit" for product "Krb5-appl"
<= 1.0.2
Search vendor "Mit" for product "Krb5-appl" and version " <= 1.0.2"
-
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
>= 7.3 <= 9.0
Search vendor "Freebsd" for product "Freebsd" and version " >= 7.3 <= 9.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
15
Search vendor "Fedoraproject" for product "Fedora" and version "15"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
16
Search vendor "Fedoraproject" for product "Fedora" and version "16"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
5.0
Search vendor "Debian" for product "Debian Linux" and version "5.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
6.0
Search vendor "Debian" for product "Debian Linux" and version "6.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
7.0
Search vendor "Debian" for product "Debian Linux" and version "7.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.3
Search vendor "Opensuse" for product "Opensuse" and version "11.3"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.4
Search vendor "Opensuse" for product "Opensuse" and version "11.4"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Desktop
Search vendor "Suse" for product "Linux Enterprise Desktop"
10
Search vendor "Suse" for product "Linux Enterprise Desktop" and version "10"
sp4
Affected
Suse
Search vendor "Suse"
Linux Enterprise Desktop
Search vendor "Suse" for product "Linux Enterprise Desktop"
11
Search vendor "Suse" for product "Linux Enterprise Desktop" and version "11"
sp1
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
9
Search vendor "Suse" for product "Linux Enterprise Server" and version "9"
-
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
10
Search vendor "Suse" for product "Linux Enterprise Server" and version "10"
sp2
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
10
Search vendor "Suse" for product "Linux Enterprise Server" and version "10"
sp3, ltss
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
10
Search vendor "Suse" for product "Linux Enterprise Server" and version "10"
sp4
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
sp1
Affected
Suse
Search vendor "Suse"
Linux Enterprise Server
Search vendor "Suse" for product "Linux Enterprise Server"
11
Search vendor "Suse" for product "Linux Enterprise Server" and version "11"
sp1, vmware
Affected
Suse
Search vendor "Suse"
Linux Enterprise Software Development Kit
Search vendor "Suse" for product "Linux Enterprise Software Development Kit"
10
Search vendor "Suse" for product "Linux Enterprise Software Development Kit" and version "10"
sp4
Affected
Suse
Search vendor "Suse"
Linux Enterprise Software Development Kit
Search vendor "Suse" for product "Linux Enterprise Software Development Kit"
11
Search vendor "Suse" for product "Linux Enterprise Software Development Kit" and version "11"
sp1
Affected