📄 3533.txt
字号:
Rule:--Sid:3533--Summary:This event is generated when an attempt is made to exploit abuffer overflow associated with the telnet client processingof the LINEMODE option.--Impact:A successful attack can cause a buffer overflow on a telnetclient and permit the execution of arbitrary code at theprivilege level of the current user.--Detailed Information:A telnet client and server can negotiate various options such asthe character set to be used in the communication exchange. Oneparticular option is the LINEMODE. Telnet LINEMODE provides amethod of processing terminal characters by the client of atelnet connection.The LINEMODE option has a sub-option Special Local Character (SLC)that identifies the special characters in the telnet exchange. Afixed-sized buffer is allocated to store the values sent in thiscommand. No validation is performed to ensure that the valuesreceived by the client fit in the allocated buffer, possibly causinga buffer overflow and the execution of arbitrary code on the clientat the privilege level of the current user.--Affected Systems:See the original report by iDEFENSE referenced below.--Attack Scenarios:An attacker can entice a user to a malicious telnet serverand return a LINEMODE command with an overly long set ofSLC values. This can cause an overflow, enabling executionof arbitrary code on a vulnerable client.--Ease of Attack:Simple. Exploit code is available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.Use Secure Shell as an alternative method of remote access.--Contributors:Sourcefire Research TeamJudy Novak <judy.novak@sourcefire.com>--Additional ReferencesiDefense:http://www.idefense.com/application/poi/display?id=220&type=vulnerabilities--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -