Multiple OS /bin/login Remote Overflow

Critical Nessus Plugin ID 11136


It is possible to execute arbitrary commands on the remote host.


The remote implementation of the /bin/login utility, used when authenticating a user via telnet or rsh contains an overflow which allows an attacker to gain a shell on this host, without even sending a shell code.

An attacker may use this flaw to log in as any user (except root) on the remote host.


Contact the vendor for a patch.

Plugin Details

Severity: Critical

ID: 11136

File Name: ttyprompt.nasl

Version: $Revision: 1.25 $

Type: remote

Published: 2002/10/03

Modified: 2016/04/13

Dependencies: 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2001/12/12

Exploitable With


Metasploit (Solaris in.telnetd TTYPROMPT Buffer Overflow)

Reference Information

CVE: CVE-2001-0797

BID: 3681, 5848

OSVDB: 690, 691

CERT-CC: CA-2001-34