TELNET: Buffer Overflow: LINEMODE

This signature detects attempts to exploit a known vulnerability in telnet client processing of the LINEMODE sub-options. Some telnet clients improperly handle replies with a large number of SLC commands; attackers can inject arbitrary code into the telnet process.

Extended Description

A remote buffer-overflow vulnerability affects multiple vendors' Telnet client. This issue is due to the application's failure to properly validate the length of user-supplied strings before copying them into static process buffers. An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.

Affected Products

F5 3-dns,Freebsd freebsd

Short Name
TELNET:OVERFLOW:LINEMODE-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
TELNET
Keywords
Buffer CVE-2005-0469 LINEMODE Overflow: bid:12918
Release Date
03/31/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Sco

Avaya

Openbsd

Apple

Trustix

Sun

Ubuntu

Openwall

Heimdal

Debian

Sgi

Slackware

Gentoo

Freebsd

Netkit

Suse

Netbsd

Alt_linux

Mit

F5

CVSS Score

7.5

Found a potential security threat?