Pufferüberlauf in netkit-telnet (Fedora Core 2)
ID: | FEDORA-2005-277 |
Distribution: | Fedora |
Plattformen: | Fedora Core 2 |
Datum: | Mi, 30. März 2005, 13:00 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469 |
Applikationen: | NetKit |
Originalnachricht |
|
--------------------------------------------------------------------- Fedora Update Notification FEDORA-2005-277 2005-03-30 --------------------------------------------------------------------- Product : Fedora Core 2 Name : telnet Version : 0.17 Release : 28.FC2.1 Summary : The client program for the telnet remote login protocol. Description : Telnet is a popular protocol for logging into remote systems over the Internet. The telnet package provides a command line telnet client. --------------------------------------------------------------------- Update Information: Two buffer overflow flaws were discovered in the way the telnet client handles messages from a server. An attacker may be able to execute arbitrary code on a victim's machine if the victim can be tricked into connecting to a malicious telnet server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2005-0468 and CAN-2005-0469 to these issues. Red Hat would like to thank iDEFENSE for their responsible disclosure of this issue. --------------------------------------------------------------------- * Thu Mar 17 2005 Harald Hoyer |