Language:
http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2011-008.txt
Severity: Critical
ID: 57462
File Name: telnetd_encrypt_overflow.nbin
Version: 1.81
Type: remote
Family: Gain a shell remotely
Published: 1/9/2012
Updated: 7/17/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Factor: Critical
Score: 9.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/o:freebsd:freebsd
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/23/2011
Vulnerability Publication Date: 12/23/2011
Core Impact
Metasploit (Linux BSD-derived Telnet Service Encryption Key ID Buffer Overflow)
ExploitHub (EH-11-760)
CVE: CVE-2011-4862
BID: 51182