FreeBSD : krb5-appl -- telnetd code execution vulnerability (4ddc78dc-300a-11e1-a2aa-0016ce01e285)

Critical Nessus Plugin ID 57403


The remote FreeBSD host is missing a security-related update.


The MIT Kerberos Team reports :

When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer.
Also see MITKRB5-SA-2011-008.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 57403

File Name: freebsd_pkg_4ddc78dc300a11e1a2aa0016ce01e285.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2011/12/27

Modified: 2014/10/17

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:krb5-appl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/12/26

Vulnerability Publication Date: 2011/12/23

Exploitable With

Core Impact

Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)

ExploitHub (EH-11-760)

Reference Information

CVE: CVE-2011-4862

BID: 51182

OSVDB: 78020

FreeBSD: SA-11:08.telnetd