TELNET: Buffer Overflow: LINEMODE
This signature detects attempts to exploit a known vulnerability in telnet client processing of the LINEMODE sub-options. Some telnet clients improperly handle replies with a large number of SLC commands; attackers can inject arbitrary code into the telnet process.
Extended Description
A remote buffer-overflow vulnerability affects multiple vendors' Telnet client. This issue is due to the application's failure to properly validate the length of user-supplied strings before copying them into static process buffers. An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.
Affected Products
F5 3-dns,Freebsd freebsd
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Sco
Avaya
Openbsd
Apple
Trustix
Sun
Ubuntu
Openwall
Heimdal
Debian
Sgi
Slackware
Gentoo
Freebsd
Netkit
Suse
Netbsd
Alt_linux
Mit
F5
7.5