Vulnerabilities > CVE-2005-2040 - Unspecified vulnerability in Telnetd
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN telnetd
nessus
Summary
Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 13 |
Nessus
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_B62C80C2B81A11DABEC500123FFE8333.NASL description A Project heimdal Security Advisory reports : The telnet client program in Heimdal has buffer overflows in the functions slc_add_reply() and env_opt_add(), which may lead to remote code execution. The telnetd server program in Heimdal has buffer overflows in the function getterminaltype, which may lead to remote code execution. The rshd server in Heimdal has a privilege escalation bug when storing forwarded credentials. The code allowes a user to overwrite a file with its credential cache, and get ownership of the file. last seen 2020-06-01 modified 2020-06-02 plugin id 21499 published 2006-05-13 reporter This script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21499 title FreeBSD : heimdal -- Multiple vulnerabilities (b62c80c2-b81a-11da-bec5-00123ffe8333) NASL family SuSE Local Security Checks NASL id SUSE_SA_2005_040.NASL description The remote host is missing the patch for the advisory SUSE-SA:2005:040 (heimdal). A remote buffer overflow has been fixed in the heimdal / kerberos telnetd daemon which could lead to a remote user executing code as root by overflowing a buffer. This attack requires the use of the kerberized telnetd of the heimdal suite, which is not used by default on SUSE systems. This is tracked by the Mitre CVE ID CVE-2005-2040. last seen 2019-10-28 modified 2005-07-20 plugin id 19249 published 2005-07-20 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19249 title SUSE-SA:2005:040: heimdal NASL family Debian Local Security Checks NASL id DEBIAN_DSA-773.NASL description This advisory adds security support for the stable amd64 distribution. It covers all security updates since the release of sarge, which were missing updated packages for the not yet official amd64 port. Future security advisories will include updates for this port as well. last seen 2020-06-01 modified 2020-06-02 plugin id 57528 published 2012-01-12 reporter This script is Copyright (C) 2012-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57528 title Debian DSA-773-1 : amd64 - several vulnerabilities NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200506-24.NASL description The remote host is affected by the vulnerability described in GLSA-200506-24 (Heimdal: Buffer overflow vulnerabilities) It has been reported that the last seen 2020-06-01 modified 2020-06-02 plugin id 18590 published 2005-06-29 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18590 title GLSA-200506-24 : Heimdal: Buffer overflow vulnerabilities NASL family Debian Local Security Checks NASL id DEBIAN_DSA-758.NASL description A buffer overflow has been discovered in the telnet server from Heimdal, a free implementation of Kerberos 5, that could lead to the execution of arbitrary code. last seen 2020-06-01 modified 2020-06-02 plugin id 19220 published 2005-07-18 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19220 title Debian DSA-758-1 : heimdal - buffer overflow
References
- http://secunia.com/advisories/15718
- http://secunia.com/advisories/15718
- http://www.debian.org/security/2005/dsa-758
- http://www.debian.org/security/2005/dsa-758
- http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml
- http://www.gentoo.org/security/en/glsa/glsa-200506-24.xml
- http://www.novell.com/linux/security/advisories/2005_40_heimdal.html
- http://www.novell.com/linux/security/advisories/2005_40_heimdal.html
- http://www.pdc.kth.se/heimdal/advisory/2005-06-20/
- http://www.pdc.kth.se/heimdal/advisory/2005-06-20/