SysV /bin/login Environment Remote Overflow (telnet check)

Critical Nessus Plugin ID 10827


It is possible to execute arbitrary code on the remote host.


The remote /bin/login seems to crash when it receives too many environment variables. This is likely due to a buffer overflow vulnerability which might allow an attacker to execute arbitrary code on the remote host.


Apply the patch from your vendor or read the CERT advisory.

Plugin Details

Severity: Critical

ID: 10827

File Name: binlogin_overflow_telnet.nasl

Version: $Revision: 1.35 $

Type: remote

Published: 2001/12/15

Modified: 2016/04/13

Dependencies: 10281

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2001/12/12

Exploitable With


Metasploit (Solaris in.telnetd TTYPROMPT Buffer Overflow)

Reference Information

CVE: CVE-2001-0797

BID: 3681, 7481

OSVDB: 690

CERT-CC: CA-2001-34