Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.53245
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 556-1 (netkit-telnet)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to netkit-telnet
announced via advisory DSA 556-1.

Michal Zalewski discovered a bug in the netkit-telnet server (telnetd)
whereby a remote attacker could cause the telnetd process to free an
invalid pointer. This causes the telnet server process to crash,
leading to a straightforward denial of service (inetd will disable the
service if telnetd is crashed repeatedly), or possibly the execution
of arbitrary code with the privileges of the telnetd process (by
default, the 'telnetd' user).

For the stable distribution (woody) this problem has been fixed in
version 0.17-18woody1.

For the unstable distribution (sid) this problem has been fixed in
version 0.17-26.

We recommend that you upgrade your netkit-telnetpackage.


Solution:
http://www.securityspace.com/smysecure/catid.html?in=DSA%20556-1

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0911
Bugtraq: 20040918 Debian netkit telnetd vulnerability (Google Search)
http://www.securityfocus.com/archive/1/375743
Debian Security Information: DSA-556 (Google Search)
http://www.debian.org/security/2004/dsa-556
XForce ISS Database: telnetd-netkit-bo(17540)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17540
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.