CVE-2001-0554
Summary
| CVE | CVE-2001-0554 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2001-08-14 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 2.2 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.0 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.0.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.0.5 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.1 | stable | All | All |
| Operating System | Freebsd | Freebsd | 2.1.0 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.1.5 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.1.6 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.1.6.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.1.7 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.1.7.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2 | current | All | All |
| Operating System | Freebsd | Freebsd | 2.2.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.2 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.3 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.4 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.5 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.6 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.7 | All | All | All |
| Operating System | Freebsd | Freebsd | 2.2.8 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.0 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.0 | releng | All | All |
| Operating System | Freebsd | Freebsd | 3.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.2 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.3 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.4 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.5 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.5 | stable | All | All |
| Operating System | Freebsd | Freebsd | 3.5.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 3.5.1 | release | All | All |
| Operating System | Freebsd | Freebsd | 3.5.1 | stable | All | All |
| Operating System | Freebsd | Freebsd | 4.0 | All | All | All |
| Operating System | Freebsd | Freebsd | 4.0 | alpha | All | All |
| Operating System | Freebsd | Freebsd | 4.0 | releng | All | All |
| Operating System | Freebsd | Freebsd | 4.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 4.1.1 | All | All | All |
| Operating System | Freebsd | Freebsd | 4.2 | All | All | All |
| Operating System | Freebsd | Freebsd | 4.3 | All | All | All |
| Operating System | Ibm | Aix | 4.3 | All | All | All |
| Operating System | Ibm | Aix | 4.3.1 | All | All | All |
| Operating System | Ibm | Aix | 4.3.2 | All | All | All |
| Operating System | Ibm | Aix | 4.3.3 | All | All | All |
| Operating System | Ibm | Aix | 5.1 | All | All | All |
| Application | Mit | Kerberos | 1.0 | All | All | All |
| Application | Mit | Kerberos 5 | 1.1 | All | All | All |
| Application | Mit | Kerberos 5 | 1.1.1 | All | All | All |
| Application | Mit | Kerberos 5 | 1.2 | All | All | All |
| Application | Mit | Kerberos 5 | 1.2.1 | All | All | All |
| Application | Mit | Kerberos 5 | 1.2.2 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.0 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.1 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.2 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.2.1 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.3 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.3.1 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.3.2 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.3.3 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.4 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.4.1 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.4.2 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.4.3 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.5 | All | All | All |
| Operating System | Netbsd | Netbsd | 1.5.1 | All | All | All |
| Application | Netkit | Linux Netkit | 0.10 | All | All | All |
| Application | Netkit | Linux Netkit | 0.11 | All | All | All |
| Application | Netkit | Linux Netkit | 0.12 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.0 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.1 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.2 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.3 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.4 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.5 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.6 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.7 | All | All | All |
| Operating System | Openbsd | Openbsd | 2.8 | All | All | All |
| Operating System | Sgi | Irix | 6.5 | All | All | All |
| Operating System | Sun | Solaris | 2.6 | All | All | All |
| Operating System | Sun | Sunos | 5.0 | All | All | All |
| Operating System | Sun | Sunos | 5.1 | All | All | All |
| Operating System | Sun | Sunos | 5.2 | All | All | All |
| Operating System | Sun | Sunos | 5.3 | All | All | All |
| Operating System | Sun | Sunos | 5.4 | All | All | All |
| Operating System | Sun | Sunos | 5.5 | All | All | All |
| Operating System | Sun | Sunos | 5.5.1 | All | All | All |
| Operating System | Sun | Sunos | 5.7 | All | All | All |
| Operating System | Sun | Sunos | 5.8 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-075-1 netkit-telnet-ssl | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| SecurityFocus HOME Mailing List: BugTraq | af854a3a-2127-422b-91ae-364da2661108 | online.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | Broken Link |
| ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc | af854a3a-2127-422b-91ae-364da2661108 | ftp.FreeBSD.org | Broken Link, Patch, Vendor Advisory |
| Xinuos Inc. | Support | Security | Advisories | Document Not Found | af854a3a-2127-422b-91ae-364da2661108 | www.calderasystems.com | Broken Link |
| Debian -- Security Information -- DSA-070-1 netkit-telnet | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | Broken Link |
| IBM AIX telnetd Buffer Overflow | af854a3a-2127-422b-91ae-364da2661108 | www.ciac.org | Broken Link |
| 404 Not Found | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | Broken Link |
| MandrakeSoft Update Advisory MDKSA-2001:068 : telnet | af854a3a-2127-422b-91ae-364da2661108 | www.linux-mandrake.com | Broken Link |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Third Party Advisory |
| ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc | af854a3a-2127-422b-91ae-364da2661108 | ftp.netbsd.org | Broken Link |
| patches.sgi.com/support/free/security/advisories/20010801-01-P | af854a3a-2127-422b-91ae-364da2661108 | patches.sgi.com | Broken Link |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | Third Party Advisory, VDB Entry |
| Compaq Support - Page Title Here | af854a3a-2127-422b-91ae-364da2661108 | ftp.support.compaq.com | Broken Link |
| Neohapsis Archives - HP Security Digests - security bulletins digest - From support_feedbackus-support.external.hp.com | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | Broken Link |
| CERT Advisory CA-2001-21 Buffer Overflow in telnetd | af854a3a-2127-422b-91ae-364da2661108 | www.cert.org | Patch, Third Party Advisory, US Government Resource |
| Multiple Vendor Telnetd Buffer Overflow Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory |
| SecurityFocus HOME Mailing List: BugTraq | af854a3a-2127-422b-91ae-364da2661108 | online.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| SecurityFocus HOME Advisories: Buffer overflow vulnerability in telnet daemon | af854a3a-2127-422b-91ae-364da2661108 | online.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| Cisco - Cisco Security Advisory: Cisco CatOS Telnet Buffer Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.cisco.com | Third Party Advisory |
| stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt | af854a3a-2127-422b-91ae-364da2661108 | stage.caldera.com | Broken Link |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Third Party Advisory |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit, Third Party Advisory, VDB Entry, Vendor Advisory |
| SecurityFocus HOME Mailing List: BugTraq | af854a3a-2127-422b-91ae-364da2661108 | online.securityfocus.com | Broken Link, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.