SysV /bin/login Environment Remote Overflow (telnet check)

critical Nessus Plugin ID 10827

Synopsis

It is possible to execute arbitrary code on the remote host.

Description

The remote /bin/login seems to crash when it receives too many environment variables. This is likely due to a buffer overflow vulnerability which might allow an attacker to execute arbitrary code on the remote host.

Solution

Apply the patch from your vendor or read the CERT advisory.

Plugin Details

Severity: Critical

ID: 10827

File Name: binlogin_overflow_telnet.nasl

Version: 1.36

Type: remote

Published: 12/15/2001

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/12/2001

Exploitable With

CANVAS (CANVAS)

Metasploit (Solaris in.telnetd TTYPROMPT Buffer Overflow)

Reference Information

CVE: CVE-2001-0797

BID: 3681, 7481

CERT-CC: CA-2001-34