Search CVE reports
1 – 2 of 2 results
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
5 affected packages
heimdal, krb4, krb5, netkit-telnet, netkit-telnet-ssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
heimdal | — | — | — | — |
krb4 | — | — | — | — |
krb5 | — | — | — | — |
netkit-telnet | — | — | — | — |
netkit-telnet-ssl | — | — | — | — |
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require...
3 affected packages
krb4, krb5, netkit-telnet
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
krb4 | — | — | — | — |
krb5 | — | — | — | — |
netkit-telnet | — | — | — | — |