Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://security.FreeBSD.org/advisories/FreeBSD-SA-11:08.telnetd.asc http://www.vuxml.org/freebsd/4ddc78dc-300a-11e1-a2aa-0016ce01e285.html
Insight
The following package is affected: krb5-appl
CVE-2011-4862
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, and Heimdal 1.5.1 and earlier allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
Severity
Classification
-
CVE CVE-2011-4862 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities