Multiple OS /bin/login Remote Overflow

critical Nessus Plugin ID 11136

Synopsis

It is possible to execute arbitrary commands on the remote host.

Description

The remote implementation of the /bin/login utility, used when authenticating a user via telnet or rsh contains an overflow which allows an attacker to gain a shell on this host, without even sending a shell code.

An attacker may use this flaw to log in as any user (except root) on the remote host.

Solution

Contact the vendor for a patch.

Plugin Details

Severity: Critical

ID: 11136

File Name: ttyprompt.nasl

Version: 1.27

Type: remote

Published: 10/3/2002

Updated: 8/1/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/12/2001

Exploitable With

CANVAS (CANVAS)

Metasploit (Solaris in.telnetd TTYPROMPT Buffer Overflow)

Reference Information

CVE: CVE-2001-0797

BID: 3681, 5848

CERT-CC: CA-2001-34