FreeBSD 'telnetd' Daemon Remote Buffer Overflow

This script is Copyright (C) 2012-2014 Tenable Network Security, Inc.


Synopsis :

The telnet server has a remote buffer overflow vulnerability.

Description :

A buffer overflow exists in libtelnet/encrypt.c in telnetd in FreeBSD
7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl)
1.0.2 and earlier, and Heimdal 1.5.1 and earlier. The vulnerability
also affects any 'telnetd' service derived from the FreeBSD codebase.
Successful exploitation could allow a remote attacker to execute
arbitrary code via a long encryption key.

Note that this vulnerability has been exploited in the wild since
December 2011.

See also :

http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2011-008.txt

Solution :

Upgrade your software to the version specified in your vendor's
advisory.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 57462 ()

Bugtraq ID: 51182

CVE ID: CVE-2011-4862