Versio.io

CVE-2001-0554

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 14-08-2001 06:00
Last modified: - 21-01-2022 03:48
Total changes: - 2

Description

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

Common Vulnerability Scoring System (CVSS)

AV:N/AC:L/Au:N/C:C/I:C/A:C
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
-
Privileges required
-
Scope
-
User interaction
10.0
Base score
10.0
10.0
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=netkit AND product=linux_netkit AND version=0.10
vendor=netkit AND product=linux_netkit AND version=0.11
vendor=mit AND product=kerberos AND version=1.0
vendor=netkit AND product=linux_netkit AND version=0.12
vendor=sgi AND product=irix AND version=6.5
vendor=mit AND product=kerberos_5 AND version=1.2
vendor=mit AND product=kerberos_5 AND version=1.2.1
vendor=mit AND product=kerberos_5 AND version=1.2.2
vendor=mit AND product=kerberos_5 AND version=1.1
vendor=mit AND product=kerberos_5 AND version=1.1.1
OR
vendor=freebsd AND product=freebsd AND version=2.0
vendor=freebsd AND product=freebsd AND version=2.0.1
vendor=freebsd AND product=freebsd AND version=2.0.5
vendor=freebsd AND product=freebsd AND version=2.1 AND update=stable
vendor=freebsd AND product=freebsd AND version=2.1.0
vendor=freebsd AND product=freebsd AND version=2.1.5
vendor=freebsd AND product=freebsd AND version=2.1.6
vendor=freebsd AND product=freebsd AND version=2.1.6.1
vendor=freebsd AND product=freebsd AND version=2.1.7
vendor=freebsd AND product=freebsd AND version=2.1.7.1
vendor=freebsd AND product=freebsd AND version=2.2
vendor=freebsd AND product=freebsd AND version=2.2 AND update=current
vendor=freebsd AND product=freebsd AND version=2.2.1
vendor=freebsd AND product=freebsd AND version=2.2.2
vendor=freebsd AND product=freebsd AND version=2.2.3
vendor=freebsd AND product=freebsd AND version=2.2.4
vendor=freebsd AND product=freebsd AND version=2.2.5
vendor=freebsd AND product=freebsd AND version=2.2.6
vendor=freebsd AND product=freebsd AND version=2.2.7
vendor=freebsd AND product=freebsd AND version=2.2.8
vendor=freebsd AND product=freebsd AND version=3.0
vendor=freebsd AND product=freebsd AND version=3.0 AND update=releng
vendor=freebsd AND product=freebsd AND version=3.1
vendor=freebsd AND product=freebsd AND version=3.2
vendor=freebsd AND product=freebsd AND version=3.3
vendor=freebsd AND product=freebsd AND version=3.4
vendor=freebsd AND product=freebsd AND version=3.5
vendor=freebsd AND product=freebsd AND version=3.5 AND update=stable
vendor=freebsd AND product=freebsd AND version=3.5.1
vendor=freebsd AND product=freebsd AND version=3.5.1 AND update=release
vendor=freebsd AND product=freebsd AND version=3.5.1 AND update=stable
vendor=freebsd AND product=freebsd AND version=4.0
vendor=freebsd AND product=freebsd AND version=4.0 AND update=alpha
vendor=freebsd AND product=freebsd AND version=4.0 AND update=releng
vendor=freebsd AND product=freebsd AND version=4.1
vendor=freebsd AND product=freebsd AND version=4.1.1
vendor=freebsd AND product=freebsd AND version=4.2
vendor=freebsd AND product=freebsd AND version=4.3
vendor=ibm AND product=aix AND version=4.3
vendor=ibm AND product=aix AND version=4.3.1
vendor=ibm AND product=aix AND version=4.3.2
vendor=ibm AND product=aix AND version=4.3.3
vendor=ibm AND product=aix AND version=5.1
vendor=netbsd AND product=netbsd AND version=1.0
vendor=netbsd AND product=netbsd AND version=1.1
vendor=netbsd AND product=netbsd AND version=1.2
vendor=netbsd AND product=netbsd AND version=1.2.1
vendor=netbsd AND product=netbsd AND version=1.3
vendor=netbsd AND product=netbsd AND version=1.3.1
vendor=netbsd AND product=netbsd AND version=1.3.2
vendor=netbsd AND product=netbsd AND version=1.3.3
vendor=netbsd AND product=netbsd AND version=1.4
vendor=netbsd AND product=netbsd AND version=1.4.1
vendor=netbsd AND product=netbsd AND version=1.4.2
vendor=netbsd AND product=netbsd AND version=1.4.3
vendor=netbsd AND product=netbsd AND version=1.5
vendor=netbsd AND product=netbsd AND version=1.5.1
vendor=openbsd AND product=openbsd AND version=2.0
vendor=openbsd AND product=openbsd AND version=2.1
vendor=openbsd AND product=openbsd AND version=2.2
vendor=openbsd AND product=openbsd AND version=2.3
vendor=openbsd AND product=openbsd AND version=2.4
vendor=openbsd AND product=openbsd AND version=2.5
vendor=openbsd AND product=openbsd AND version=2.6
vendor=openbsd AND product=openbsd AND version=2.7
vendor=openbsd AND product=openbsd AND version=2.8
vendor=sun AND product=solaris AND version=2.6
vendor=sun AND product=sunos AND version=5.0
vendor=sun AND product=sunos AND version=5.1
vendor=sun AND product=sunos AND version=5.2
vendor=sun AND product=sunos AND version=5.3
vendor=sun AND product=sunos AND version=5.4
vendor=sun AND product=sunos AND version=5.5
vendor=sun AND product=sunos AND version=5.5.1
vendor=sun AND product=sunos AND version=5.7
vendor=sun AND product=sunos AND version=5.8
OR
vendor=Debian AND product=debian_linux AND version=2.2
 

Reference

 


Keywords

NVD

 

CVE-2001-0554

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.