7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.921 High
EPSS
Percentile
99.0%
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | heimdal | < 0.6.3-10 | heimdal_0.6.3-10_all.deb |
Debian | 11 | all | heimdal | < 0.6.3-10 | heimdal_0.6.3-10_all.deb |
Debian | 999 | all | heimdal | < 0.6.3-10 | heimdal_0.6.3-10_all.deb |
Debian | 13 | all | heimdal | < 0.6.3-10 | heimdal_0.6.3-10_all.deb |
Debian | 12 | all | krb5 | < 1.3.6-2 | krb5_1.3.6-2_all.deb |
Debian | 11 | all | krb5 | < 1.3.6-2 | krb5_1.3.6-2_all.deb |
Debian | 999 | all | krb5 | < 1.3.6-2 | krb5_1.3.6-2_all.deb |
Debian | 13 | all | krb5 | < 1.3.6-2 | krb5_1.3.6-2_all.deb |
Debian | 11 | all | netkit-telnet | < 0.17-28 | netkit-telnet_0.17-28_all.deb |
Debian | 12 | all | netkit-telnet-ssl | < 0.17.24+0.1-7.1 | netkit-telnet-ssl_0.17.24+0.1-7.1_all.deb |