CVE-2001-0554 (CNNVD-200108-082)

CRITICAL 有利用代码
中文标题:
多家厂商基于BSD系统Telnetd远程堆溢出漏洞
英文标题:
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attack...
CVSS分数: 10.0
发布时间: 2002-03-09 05:00:00
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Telnet是一个广泛使用的明文的远程连接虚拟终端协议,可以用来对远程计算机进行操作。目前使用最多的telnetd版本都是源于BSD telnetd的某个派生。来源于BSD telnet守护程序的telnetd存在一个堆溢出漏洞,远程攻击者可能通过溢出攻击在主机上以telnetd守护进程的权限(通常是root)执行任意指令。在处理telnet协议选项的函数中没有进行有效的边界检查,当使用某些选项('AYT')时,可能发生缓冲区溢出。由于攻击者可以控制的字符是有限的而且溢出发生在BSS区,因此,攻击受到一定限制。但是发现者报告说至少在某些系统(FreeBSD/BSDI/NetBSD)下攻击是切实可行的,一个可用的攻击程序已经广泛流传。在Linux系统下,如果用户可以获取对系统的本地访问权限,它可以通过telnetd的漏洞为/bin/login设置环境变量,例如LD_PRELOAD=/tmp/make-rootshell.so 。如果用户没有本地访问权限,他可以覆盖一些块(chunk)结果,setenv(3)会使用这些结构,并在用户可以控制的内存取中一个新的chunk,因此当环境变量重新分配内存时会改变任意内存地址的值。最新的报告显示Linux netkit-telnetd <= 0.17版本都是受影响的,攻击者可能远程获取root权限。

英文描述:

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

CWE类型:
CWE-120
标签:
remote unix Dvorak OSVDB-809
受影响产品
厂商 产品 版本 版本范围 平台 CPE
mit kerberos 1.0 - - cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*
mit kerberos_5 1.1 - - cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*
mit kerberos_5 1.1.1 - - cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*
mit kerberos_5 1.2 - - cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*
mit kerberos_5 1.2.1 - - cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*
mit kerberos_5 1.2.2 - - cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*
netkit linux_netkit 0.10 - - cpe:2.3:a:netkit:linux_netkit:0.10:*:*:*:*:*:*:*
netkit linux_netkit 0.11 - - cpe:2.3:a:netkit:linux_netkit:0.11:*:*:*:*:*:*:*
netkit linux_netkit 0.12 - - cpe:2.3:a:netkit:linux_netkit:0.12:*:*:*:*:*:*:*
sgi irix 6.5 - - cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
freebsd freebsd 2.0 - - cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*
freebsd freebsd 2.0.1 - - cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*
freebsd freebsd 2.0.5 - - cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*
freebsd freebsd 2.1 - - cpe:2.3:o:freebsd:freebsd:2.1:stable:*:*:*:*:*:*
freebsd freebsd 2.1.0 - - cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*
freebsd freebsd 2.1.5 - - cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*
freebsd freebsd 2.1.6 - - cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*
freebsd freebsd 2.1.6.1 - - cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*
freebsd freebsd 2.1.7 - - cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*
freebsd freebsd 2.1.7.1 - - cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*
freebsd freebsd 2.2 - - cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*
freebsd freebsd 2.2.1 - - cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*
freebsd freebsd 2.2.2 - - cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*
freebsd freebsd 2.2.3 - - cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*
freebsd freebsd 2.2.4 - - cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*
freebsd freebsd 2.2.5 - - cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*
freebsd freebsd 2.2.6 - - cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*
freebsd freebsd 2.2.7 - - cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*
freebsd freebsd 2.2.8 - - cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*
freebsd freebsd 3.0 - - cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*
freebsd freebsd 3.1 - - cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*
freebsd freebsd 3.2 - - cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*
freebsd freebsd 3.3 - - cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*
freebsd freebsd 3.4 - - cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*
freebsd freebsd 3.5 - - cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*
freebsd freebsd 3.5.1 - - cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*
freebsd freebsd 4.0 - - cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
freebsd freebsd 4.1 - - cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
freebsd freebsd 4.1.1 - - cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
freebsd freebsd 4.2 - - cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
freebsd freebsd 4.3 - - cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
ibm aix 4.3 - - cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*
ibm aix 4.3.1 - - cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*
ibm aix 4.3.2 - - cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*
ibm aix 4.3.3 - - cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
ibm aix 5.1 - - cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
netbsd netbsd 1.0 - - cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*
netbsd netbsd 1.1 - - cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*
netbsd netbsd 1.2 - - cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*
netbsd netbsd 1.2.1 - - cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*
netbsd netbsd 1.3 - - cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*
netbsd netbsd 1.3.1 - - cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*
netbsd netbsd 1.3.2 - - cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*
netbsd netbsd 1.3.3 - - cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*
netbsd netbsd 1.4 - - cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*
netbsd netbsd 1.4.1 - - cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
netbsd netbsd 1.4.2 - - cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
netbsd netbsd 1.4.3 - - cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*
netbsd netbsd 1.5 - - cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
netbsd netbsd 1.5.1 - - cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
openbsd openbsd 2.0 - - cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*
openbsd openbsd 2.1 - - cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
openbsd openbsd 2.2 - - cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
openbsd openbsd 2.3 - - cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
openbsd openbsd 2.4 - - cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
openbsd openbsd 2.5 - - cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
openbsd openbsd 2.6 - - cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
openbsd openbsd 2.7 - - cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
openbsd openbsd 2.8 - - cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
sun solaris 2.6 - - cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
sun sunos 5.0 - - cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
sun sunos 5.1 - - cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*
sun sunos 5.2 - - cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*
sun sunos 5.3 - - cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*
sun sunos 5.4 - - cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
sun sunos 5.5 - - cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
sun sunos 5.5.1 - - cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
sun sunos 5.7 - - cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
sun sunos 5.8 - - cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
debian debian_linux 2.2 - - cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
CLA-2001:413 vendor-advisory
cve.org
访问
MDKSA-2001:068 vendor-advisory
cve.org
访问
L-131 third-party-advisory
cve.org
访问
SSRT0745U vendor-advisory
cve.org
访问
telnetd-option-telrcv-bo(6875) vdb-entry
cve.org
访问
809 vdb-entry
cve.org
访问
MSS-OAR-E01-2001:298 vendor-advisory
cve.org
访问
20010725 Telnetd AYT overflow scanner mailing-list
cve.org
访问
20010810 ADV/EXP: netkit <=0.17 in.telnetd remote buffer overflow mailing-list
cve.org
访问
3064 vdb-entry
cve.org
访问
RHSA-2001:100 vendor-advisory
cve.org
访问
SuSE-SA:2001:029 vendor-advisory
cve.org
访问
CSSA-2001-SCO.10 vendor-advisory
cve.org
访问
RHSA-2001:099 vendor-advisory
cve.org
访问
20020129 Cisco CatOS Telnet Buffer Vulnerability vendor-advisory
cve.org
访问
HPSBUX0110-172 vendor-advisory
cve.org
访问
DSA-075 vendor-advisory
cve.org
访问
20010718 multiple vendor telnet daemon vulnerability mailing-list
cve.org
访问
CA-2001-21 third-party-advisory
cve.org
访问
FreeBSD-SA-01:49 vendor-advisory
cve.org
访问
CSSA-2001-030.0 vendor-advisory
cve.org
访问
DSA-070 vendor-advisory
cve.org
访问
20010725 SCO - Telnetd AYT overflow ? mailing-list
cve.org
访问
20010801-01-P vendor-advisory
cve.org
访问
NetBSD-SA2001-012 vendor-advisory
cve.org
访问
ExploitDB EDB-21018 EXPLOIT
exploitdb
访问
Download Exploit EDB-21018 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2001-0554 ADVISORY
cve.org
访问
CVSS评分详情
10.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2002-03-09 05:00:00
修改时间:
2024-08-08 04:21:38
创建时间:
2025-11-11 15:32:14
更新时间:
2025-11-11 16:16:02
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2001-0554 2025-11-11 15:17:21 2025-11-11 07:32:14
NVD nvd_CVE-2001-0554 2025-11-11 14:50:26 2025-11-11 07:40:59
CNNVD cnnvd_CNNVD-200108-082 2025-11-11 15:08:40 2025-11-11 07:48:46
EXPLOITDB exploitdb_EDB-21018 2025-11-11 15:05:48 2025-11-11 08:16:02
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:16:02
references_count: 25 → 28; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 25 -> 28
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:46
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-200108-082; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-200108-082
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:40:59
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 80; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 10.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 80
  • data_sources: ['cve'] -> ['cve', 'nvd']