Short Name |
TELNET:OVERFLOW:BSD-ENCRY-KEYID |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
TELNET |
Keywords |
Multiple Vendors BSD telnetd Encryption Key Buffer Overflow |
Release Date |
2012/01/19 |
Update Number |
2066 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known flaw in BSD telnetd. The vulnerability is due to the copying of an encryption key into a fixed-length buffer without validation of the key's length. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted packet to telnetd. A successful exploitation attempt could result in the execution of arbitrary code in the security context of the Telnet daemon.
FreeBSD is prone to a remote buffer-overflow vulnerability. Exploiting this issue allows remote attackers to execute arbitrary code with superuser privileges. Successfully exploiting this issue will completely compromise affected computers.