Lucene search

K
cve[email protected]CVE-2001-0554
HistoryMar 09, 2002 - 5:00 a.m.

CVE-2001-0554

2002-03-0905:00:00
CWE-120
web.nvd.nist.gov
6315
cve-2001-0554
buffer overflow
bsd
telnetd
remote execution
ayt options
telrcv.

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

83.1%

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

Affected configurations

NVD
Node
mitkerberosMatch1.0
OR
mitkerberos_5Match1.1
OR
mitkerberos_5Match1.1.1
OR
mitkerberos_5Match1.2
OR
mitkerberos_5Match1.2.1
OR
mitkerberos_5Match1.2.2
OR
netkitlinux_netkitMatch0.10
OR
netkitlinux_netkitMatch0.11
OR
netkitlinux_netkitMatch0.12
OR
sgiirixMatch6.5
Node
freebsdfreebsdMatch2.0
OR
freebsdfreebsdMatch2.0.1
OR
freebsdfreebsdMatch2.0.5
OR
freebsdfreebsdMatch2.1stable
OR
freebsdfreebsdMatch2.1.0
OR
freebsdfreebsdMatch2.1.5
OR
freebsdfreebsdMatch2.1.6
OR
freebsdfreebsdMatch2.1.6.1
OR
freebsdfreebsdMatch2.1.7
OR
freebsdfreebsdMatch2.1.7.1
OR
freebsdfreebsdMatch2.2
OR
freebsdfreebsdMatch2.2current
OR
freebsdfreebsdMatch2.2.1
OR
freebsdfreebsdMatch2.2.2
OR
freebsdfreebsdMatch2.2.3
OR
freebsdfreebsdMatch2.2.4
OR
freebsdfreebsdMatch2.2.5
OR
freebsdfreebsdMatch2.2.6
OR
freebsdfreebsdMatch2.2.7
OR
freebsdfreebsdMatch2.2.8
OR
freebsdfreebsdMatch3.0
OR
freebsdfreebsdMatch3.0releng
OR
freebsdfreebsdMatch3.1
OR
freebsdfreebsdMatch3.2
OR
freebsdfreebsdMatch3.3
OR
freebsdfreebsdMatch3.4
OR
freebsdfreebsdMatch3.5
OR
freebsdfreebsdMatch3.5stable
OR
freebsdfreebsdMatch3.5.1
OR
freebsdfreebsdMatch3.5.1release
OR
freebsdfreebsdMatch3.5.1stable
OR
freebsdfreebsdMatch4.0
OR
freebsdfreebsdMatch4.0alpha
OR
freebsdfreebsdMatch4.0releng
OR
freebsdfreebsdMatch4.1
OR
freebsdfreebsdMatch4.1.1
OR
freebsdfreebsdMatch4.2
OR
freebsdfreebsdMatch4.3
OR
ibmaixMatch4.3
OR
ibmaixMatch4.3.1
OR
ibmaixMatch4.3.2
OR
ibmaixMatch4.3.3
OR
ibmaixMatch5.1
OR
netbsdnetbsdMatch1.0
OR
netbsdnetbsdMatch1.1
OR
netbsdnetbsdMatch1.2
OR
netbsdnetbsdMatch1.2.1
OR
netbsdnetbsdMatch1.3
OR
netbsdnetbsdMatch1.3.1
OR
netbsdnetbsdMatch1.3.2
OR
netbsdnetbsdMatch1.3.3
OR
netbsdnetbsdMatch1.4
OR
netbsdnetbsdMatch1.4.1
OR
netbsdnetbsdMatch1.4.2
OR
netbsdnetbsdMatch1.4.3
OR
netbsdnetbsdMatch1.5
OR
netbsdnetbsdMatch1.5.1
OR
openbsdopenbsdMatch2.0
OR
openbsdopenbsdMatch2.1
OR
openbsdopenbsdMatch2.2
OR
openbsdopenbsdMatch2.3
OR
openbsdopenbsdMatch2.4
OR
openbsdopenbsdMatch2.5
OR
openbsdopenbsdMatch2.6
OR
openbsdopenbsdMatch2.7
OR
openbsdopenbsdMatch2.8
OR
sunsolarisMatch2.6
OR
sunsunosMatch5.0
OR
sunsunosMatch5.1
OR
sunsunosMatch5.2
OR
sunsunosMatch5.3
OR
sunsunosMatch5.4
OR
sunsunosMatch5.5
OR
sunsunosMatch5.5.1
OR
sunsunosMatch5.7
OR
sunsunosMatch5.8
Node
debiandebian_linuxMatch2.2

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.4 High

AI Score

Confidence

Low

0.009 Low

EPSS

Percentile

83.1%