{"api_version":"1","generated_at":"2026-04-22T17:45:52+00:00","cve":"CVE-2001-0554","urls":{"html":"https://cve.report/CVE-2001-0554","api":"https://cve.report/api/cve/CVE-2001-0554.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2001-0554","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2001-0554"},"summary":{"title":"CVE-2001-0554","description":"Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.","state":"PUBLISHED","assigner":"mitre","published_at":"2001-08-14 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-120","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.debian.org/security/2001/dsa-075","name":"http://www.debian.org/security/2001/dsa-075","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-075-1 netkit-telnet-ssl","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://online.securityfocus.com/archive/1/199541","name":"http://online.securityfocus.com/archive/1/199541","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus HOME Mailing List: BugTraq","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html","name":"http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc","name":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"404","archivestatus":"404"},{"url":"http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt","name":"http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Xinuos Inc. | Support | Security | Advisories | Document Not Found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.debian.org/security/2001/dsa-070","name":"http://www.debian.org/security/2001/dsa-070","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-070-1 netkit-telnet","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413","name":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Home - Conectiva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ciac.org/ciac/bulletins/l-131.shtml","name":"http://www.ciac.org/ciac/bulletins/l-131.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"IBM AIX telnetd Buffer Overflow","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.osvdb.org/809","name":"http://www.osvdb.org/809","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"404 Not Found","mime":"text/html","httpstatus":"404","archivestatus":"403"},{"url":"http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3","name":"http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"MandrakeSoft Update Advisory MDKSA-2001:068 : telnet","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2001-100.html","name":"http://www.redhat.com/support/errata/RHSA-2001-100.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc","name":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P","name":"ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6875","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6875","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml","name":"http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Compaq Support - Page Title Here","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/hp/2001-q4/0014.html","name":"http://archives.neohapsis.com/archives/hp/2001-q4/0014.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Neohapsis Archives - HP Security Digests - security bulletins digest - From support_feedbackus-support.external.hp.com","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.cert.org/advisories/CA-2001-21.html","name":"http://www.cert.org/advisories/CA-2001-21.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"],"title":"CERT Advisory CA-2001-21 Buffer Overflow in telnetd","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/3064","name":"http://www.securityfocus.com/bid/3064","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory","VDB Entry","Vendor Advisory"],"title":"Multiple Vendor Telnetd Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://online.securityfocus.com/archive/1/199496","name":"http://online.securityfocus.com/archive/1/199496","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus HOME Mailing List: BugTraq","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://online.securityfocus.com/advisories/3476","name":"http://online.securityfocus.com/advisories/3476","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus HOME Advisories: Buffer overflow vulnerability in telnet daemon","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml","name":"http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Cisco - Cisco Security Advisory: Cisco CatOS Telnet Buffer Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt","name":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.redhat.com/support/errata/RHSA-2001-099.html","name":"http://www.redhat.com/support/errata/RHSA-2001-099.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/197804","name":"http://www.securityfocus.com/archive/1/197804","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry","Vendor Advisory"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://online.securityfocus.com/archive/1/203000","name":"http://online.securityfocus.com/archive/1/203000","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus HOME Mailing List: BugTraq","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2001-0554","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-0554","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1","cpe7":"stable","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.1.7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2","cpe7":"current","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"2.2.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.0","cpe7":"releng","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.5","cpe7":"stable","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.5.1","cpe7":"release","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"3.5.1","cpe7":"stable","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.0","cpe7":"alpha","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.0","cpe7":"releng","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"freebsd","cpe5":"freebsd","cpe6":"4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"4.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"4.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"4.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"ibm","cpe5":"aix","cpe6":"5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mit","cpe5":"kerberos","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mit","cpe5":"kerberos_5","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mit","cpe5":"kerberos_5","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mit","cpe5":"kerberos_5","cpe6":"1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mit","cpe5":"kerberos_5","cpe6":"1.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mit","cpe5":"kerberos_5","cpe6":"1.2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.4.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.4.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"netbsd","cpe5":"netbsd","cpe6":"1.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netkit","cpe5":"linux_netkit","cpe6":"0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netkit","cpe5":"linux_netkit","cpe6":"0.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netkit","cpe5":"linux_netkit","cpe6":"0.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"openbsd","cpe5":"openbsd","cpe6":"2.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sgi","cpe5":"irix","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"solaris","cpe6":"2.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"554","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"sun","cpe5":"sunos","cpe6":"5.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T04:21:38.679Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"CLA-2001:413","tags":["vendor-advisory","x_refsource_CONECTIVA","x_transferred"],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413"},{"name":"MDKSA-2001:068","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3"},{"name":"L-131","tags":["third-party-advisory","government-resource","x_refsource_CIAC","x_transferred"],"url":"http://www.ciac.org/ciac/bulletins/l-131.shtml"},{"name":"SSRT0745U","tags":["vendor-advisory","x_refsource_COMPAQ","x_transferred"],"url":"http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml"},{"name":"telnetd-option-telrcv-bo(6875)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6875"},{"name":"809","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/809"},{"name":"MSS-OAR-E01-2001:298","tags":["vendor-advisory","x_refsource_IBM","x_transferred"],"url":"http://online.securityfocus.com/advisories/3476"},{"name":"20010725 Telnetd AYT overflow scanner","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://online.securityfocus.com/archive/1/199496"},{"name":"20010810 ADV/EXP: netkit <=0.17 in.telnetd remote buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://online.securityfocus.com/archive/1/203000"},{"name":"3064","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/3064"},{"name":"RHSA-2001:100","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2001-100.html"},{"name":"SuSE-SA:2001:029","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html"},{"name":"CSSA-2001-SCO.10","tags":["vendor-advisory","x_refsource_CALDERA","x_transferred"],"url":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt"},{"name":"RHSA-2001:099","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2001-099.html"},{"name":"20020129 Cisco CatOS Telnet Buffer Vulnerability","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml"},{"name":"HPSBUX0110-172","tags":["vendor-advisory","x_refsource_HP","x_transferred"],"url":"http://archives.neohapsis.com/archives/hp/2001-q4/0014.html"},{"name":"DSA-075","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2001/dsa-075"},{"name":"20010718 multiple vendor telnet daemon vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/197804"},{"name":"CA-2001-21","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.cert.org/advisories/CA-2001-21.html"},{"name":"FreeBSD-SA-01:49","tags":["vendor-advisory","x_refsource_FREEBSD","x_transferred"],"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc"},{"name":"CSSA-2001-030.0","tags":["vendor-advisory","x_refsource_CALDERA","x_transferred"],"url":"http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt"},{"name":"DSA-070","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2001/dsa-070"},{"name":"20010725 SCO - Telnetd AYT overflow ?","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://online.securityfocus.com/archive/1/199541"},{"name":"20010801-01-P","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P"},{"name":"NetBSD-SA2001-012","tags":["vendor-advisory","x_refsource_NETBSD","x_transferred"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2001-07-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2009-03-02T00:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"CLA-2001:413","tags":["vendor-advisory","x_refsource_CONECTIVA"],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413"},{"name":"MDKSA-2001:068","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3"},{"name":"L-131","tags":["third-party-advisory","government-resource","x_refsource_CIAC"],"url":"http://www.ciac.org/ciac/bulletins/l-131.shtml"},{"name":"SSRT0745U","tags":["vendor-advisory","x_refsource_COMPAQ"],"url":"http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml"},{"name":"telnetd-option-telrcv-bo(6875)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6875"},{"name":"809","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/809"},{"name":"MSS-OAR-E01-2001:298","tags":["vendor-advisory","x_refsource_IBM"],"url":"http://online.securityfocus.com/advisories/3476"},{"name":"20010725 Telnetd AYT overflow scanner","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://online.securityfocus.com/archive/1/199496"},{"name":"20010810 ADV/EXP: netkit <=0.17 in.telnetd remote buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://online.securityfocus.com/archive/1/203000"},{"name":"3064","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/3064"},{"name":"RHSA-2001:100","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2001-100.html"},{"name":"SuSE-SA:2001:029","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html"},{"name":"CSSA-2001-SCO.10","tags":["vendor-advisory","x_refsource_CALDERA"],"url":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt"},{"name":"RHSA-2001:099","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2001-099.html"},{"name":"20020129 Cisco CatOS Telnet Buffer Vulnerability","tags":["vendor-advisory","x_refsource_CISCO"],"url":"http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml"},{"name":"HPSBUX0110-172","tags":["vendor-advisory","x_refsource_HP"],"url":"http://archives.neohapsis.com/archives/hp/2001-q4/0014.html"},{"name":"DSA-075","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2001/dsa-075"},{"name":"20010718 multiple vendor telnet daemon vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/197804"},{"name":"CA-2001-21","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.cert.org/advisories/CA-2001-21.html"},{"name":"FreeBSD-SA-01:49","tags":["vendor-advisory","x_refsource_FREEBSD"],"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc"},{"name":"CSSA-2001-030.0","tags":["vendor-advisory","x_refsource_CALDERA"],"url":"http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt"},{"name":"DSA-070","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2001/dsa-070"},{"name":"20010725 SCO - Telnetd AYT overflow ?","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://online.securityfocus.com/archive/1/199541"},{"name":"20010801-01-P","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P"},{"name":"NetBSD-SA2001-012","tags":["vendor-advisory","x_refsource_NETBSD"],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2001-0554","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"CLA-2001:413","refsource":"CONECTIVA","url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413"},{"name":"MDKSA-2001:068","refsource":"MANDRAKE","url":"http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3"},{"name":"L-131","refsource":"CIAC","url":"http://www.ciac.org/ciac/bulletins/l-131.shtml"},{"name":"SSRT0745U","refsource":"COMPAQ","url":"http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml"},{"name":"telnetd-option-telrcv-bo(6875)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6875"},{"name":"809","refsource":"OSVDB","url":"http://www.osvdb.org/809"},{"name":"MSS-OAR-E01-2001:298","refsource":"IBM","url":"http://online.securityfocus.com/advisories/3476"},{"name":"20010725 Telnetd AYT overflow scanner","refsource":"BUGTRAQ","url":"http://online.securityfocus.com/archive/1/199496"},{"name":"20010810 ADV/EXP: netkit <=0.17 in.telnetd remote buffer overflow","refsource":"BUGTRAQ","url":"http://online.securityfocus.com/archive/1/203000"},{"name":"3064","refsource":"BID","url":"http://www.securityfocus.com/bid/3064"},{"name":"RHSA-2001:100","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2001-100.html"},{"name":"SuSE-SA:2001:029","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html"},{"name":"CSSA-2001-SCO.10","refsource":"CALDERA","url":"ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt"},{"name":"RHSA-2001:099","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2001-099.html"},{"name":"20020129 Cisco CatOS Telnet Buffer Vulnerability","refsource":"CISCO","url":"http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml"},{"name":"HPSBUX0110-172","refsource":"HP","url":"http://archives.neohapsis.com/archives/hp/2001-q4/0014.html"},{"name":"DSA-075","refsource":"DEBIAN","url":"http://www.debian.org/security/2001/dsa-075"},{"name":"20010718 multiple vendor telnet daemon vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/197804"},{"name":"CA-2001-21","refsource":"CERT","url":"http://www.cert.org/advisories/CA-2001-21.html"},{"name":"FreeBSD-SA-01:49","refsource":"FREEBSD","url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc"},{"name":"CSSA-2001-030.0","refsource":"CALDERA","url":"http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt"},{"name":"DSA-070","refsource":"DEBIAN","url":"http://www.debian.org/security/2001/dsa-070"},{"name":"20010725 SCO - Telnetd AYT overflow ?","refsource":"BUGTRAQ","url":"http://online.securityfocus.com/archive/1/199541"},{"name":"20010801-01-P","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P"},{"name":"NetBSD-SA2001-012","refsource":"NETBSD","url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2001-0554","datePublished":"2002-03-09T05:00:00.000Z","dateReserved":"2001-07-24T00:00:00.000Z","dateUpdated":"2024-08-08T04:21:38.679Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2001-08-14 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-120","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ACC18A69-28AC-4DED-AA9D-B050709A9D43"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*","matchCriteriaId":"7A37987D-22F9-47AC-A07A-380F7E509BFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*","matchCriteriaId":"BE8C0C82-749E-4837-88F8-FB56A753B094"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"8AD672FA-918D-48CB-BC03-4E412AF0DCCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"D0B363A4-BB7A-48A2-AE6B-BD2DDD46E7CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:netkit:linux_netkit:0.10:*:*:*:*:*:*:*","matchCriteriaId":"5B3630EB-0966-49C2-9B59-368E5374A1C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:netkit:linux_netkit:0.11:*:*:*:*:*:*:*","matchCriteriaId":"62B7A341-D568-45DD-B4D7-18892DD19819"},{"vulnerable":true,"criteria":"cpe:2.3:a:netkit:linux_netkit:0.12:*:*:*:*:*:*:*","matchCriteriaId":"65D5FAF4-4AE0-4657-B71A-3F3870E36192"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"63236405-1F33-43DD-ACF7-B6D9656E0987"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1:stable:*:*:*:*:*:*","matchCriteriaId":"F25E27BA-F884-456B-9600-A4A0B8877A6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"7891202C-62AF-4590-9E5F-3514FDA2B38E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*","matchCriteriaId":"CF4F7002-A525-4A66-BE8B-E50ABBF144B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:current:*:*:*:*:*:*","matchCriteriaId":"FE799983-DF99-428E-B560-321680C85A75"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"F1156954-25AD-45BE-AE49-9705ECD5BDA2"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"2EAD7613-A5B3-4621-B981-290C7C6B8BA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*","matchCriteriaId":"8ED84E66-CFD9-4DF8-9679-13457D340D54"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*","matchCriteriaId":"A0A3F7B6-2878-40C0-B59C-EBA8D171D2F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*","matchCriteriaId":"47E02BE6-4800-4940-B269-385B66AC5077"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*","matchCriteriaId":"0EB09993-B837-4352-B09D-3656F62638A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*","matchCriteriaId":"0361EA35-FBD7-4E8F-8625-C8100ED7BB7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*","matchCriteriaId":"29EAA113-2404-4ABB-826B-3AA2AA858D02"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D0A585A1-FF82-418F-90F8-072458DB7816"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*","matchCriteriaId":"E3F7EB61-55A5-4776-B0E7-3508920A6CEA"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*","matchCriteriaId":"A442DE97-4485-4D95-B95D-58947585E455"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*","matchCriteriaId":"AE31DFF8-06AB-489D-A0C5-509C090283B5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*","matchCriteriaId":"DF49BF03-C25E-4737-84D5-892895C86C58"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*","matchCriteriaId":"D2019E0E-426B-43AF-8904-1B811AE171E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*","matchCriteriaId":"465B06C4-136D-4CD8-BA38-B6B50511624C"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"BCB23261-D5A9-4C49-B08E-97A63ED6F84A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*","matchCriteriaId":"C422E343-ADF2-427D-865D-B5C35431EFD1"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"1C288A88-11C6-429E-A109-0395D0989264"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"516C6D9A-7483-4E36-A2E0-42698161AD31"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*","matchCriteriaId":"B1F89124-E194-4C7A-B06D-8535B4066AA3"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*","matchCriteriaId":"E10D9BF9-FCC7-4680-AD3A-95757FC005EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"78E8C3A4-9FA7-4F2A-8C65-D4404715E674"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"36DF0D51-FCFA-46A3-B834-E80DFA91DFDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5CB726CF-ADA2-4CDA-9786-1E84AC53740A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","matchCriteriaId":"0DF053A1-C252-427E-9EEF-27240F422976"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*","matchCriteriaId":"48A9C344-45AA-47B9-B35A-1A62E220D9C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*","matchCriteriaId":"80EB24F0-46A7-481B-83ED-8BB012AE0C8E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2001","CveId":"554","Ordinal":"1","Title":"CVE-2001-0554","CVE":"CVE-2001-0554","Year":"2001"},"notes":[{"CveYear":"2001","CveId":"554","Ordinal":"1","NoteData":"Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.","Type":"Description","Title":"CVE-2001-0554"},{"CveYear":"2001","CveId":"554","Ordinal":"2","NoteData":"2002-03-09","Type":"Other","Title":"Published"},{"CveYear":"2001","CveId":"554","Ordinal":"3","NoteData":"2009-03-01","Type":"Other","Title":"Modified"}]}}}