TELNET: NEW-ENVIRON Overflow

This signature detects attempts to exploit a known vulnerability in telnet clients. The env_opt_add function of some telnet clients incorrectly handles NEWENVIRON sub-options. Attackers can send a maliciously crafted SEND command to a telnet client to overflow the buffer, then execute arbitrary code on the target system with the telnet client account privileges.

Extended Description

Multiple vendors' Telnet client applications are reported prone to a remote buffer-overflow vulnerability. This vulnerability reportedly occurs in the 'env_opt_add()' function in the 'telnet.c' source file, which is apparently common source for all the affected vendors. A remote attacker may exploit this vulnerability to execute arbitrary code on some of the affected platforms in the context of a user that is using the vulnerable Telnet client to connect to a malicious server.

Affected Products

F5 3-dns,Freebsd freebsd

Short Name
TELNET:OVERFLOW:NEW-ENVIRON-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
TELNET
Keywords
CVE-2005-0468 NEW-ENVIRON Overflow bid:12919
Release Date
04/04/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Sco

Conectiva

Openbsd

Apple

Gentoo

Netkit

Ubuntu

Openwall

Avaya

Debian

Sgi

Trustix

Freebsd

Sun

Suse

Netbsd

Alt_linux

Heimdal

Mit

F5

CVSS Score

7.5

Found a potential security threat?