FreeBSD : krb5-appl -- telnetd code execution vulnerability (4ddc78dc-300a-11e1-a2aa-0016ce01e285)

critical Nessus Plugin ID 57403


The remote FreeBSD host is missing a security-related update.


The MIT Kerberos Team reports :

When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer.
Also see MITKRB5-SA-2011-008.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 57403

File Name: freebsd_pkg_4ddc78dc300a11e1a2aa0016ce01e285.nasl

Version: 1.19

Type: local

Published: 12/27/2011

Updated: 1/6/2021

Risk Information


Risk Factor: Critical

Score: 9.2


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:krb5-appl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/26/2011

Vulnerability Publication Date: 12/23/2011

Exploitable With

Core Impact

Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)

ExploitHub (EH-11-760)

Reference Information

CVE: CVE-2011-4862

BID: 51182

FreeBSD: SA-11:08.telnetd