SysV /bin/login Environment Remote Overflow (rlogin)

critical Nessus Plugin ID 10828

Synopsis

It is possible to execute arbitrary code on the remote host.

Description

The remote /bin/login seems to crash when it receives too many environment variables. This is likely due to a buffer overflow vulnerability which might allow an attacker to execute arbitrary code on the remote host.

Solution

Apply the patch from your vendor (or read the CERT advisory).

Plugin Details

Severity: Critical

ID: 10828

File Name: binlogin_overflow_rlogin.nasl

Version: 1.35

Type: remote

Published: 12/15/2001

Updated: 6/27/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 12/12/2001

Exploitable With

CANVAS (CANVAS)

Metasploit (Solaris in.telnetd TTYPROMPT Buffer Overflow)

Reference Information

CVE: CVE-2001-0797

BID: 3681

CERT-CC: CA-2001-34