SysV /bin/login Environment Remote Overflow (rlogin)

Critical Nessus Plugin ID 10828


It is possible to execute arbitrary code on the remote host.


The remote /bin/login seems to crash when it receives too many environment variables. This is likely due to a buffer overflow vulnerability which might allow an attacker to execute arbitrary code on the remote host.


Apply the patch from your vendor (or read the CERT advisory).

Plugin Details

Severity: Critical

ID: 10828

File Name: binlogin_overflow_rlogin.nasl

Version: $Revision: 1.34 $

Type: remote

Published: 2001/12/15

Modified: 2016/04/13

Dependencies: 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2001/12/12

Exploitable With


Metasploit (Solaris in.telnetd TTYPROMPT Buffer Overflow)

Reference Information

CVE: CVE-2001-0797

BID: 3681

OSVDB: 691

CERT-CC: CA-2001-34