ID CVE-2005-0488
Summary Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:telnet_client:5.1.2600.2180:*:*:*:*:*:*:*
  • cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:mit:kerberos_5:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*
    cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 21-01-2020 - 15:45)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
oval via4
  • accepted 2013-04-29T04:13:35.713-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    description Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
    family unix
    id oval:org.mitre.oval:def:11373
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
    version 30
  • accepted 2005-09-21T01:33:00.000-04:00
    class vulnerability
    contributors
    name Jay Beale
    organization Bastille Linux
    description Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
    family unix
    id oval:org.mitre.oval:def:1139
    status accepted
    submitted 2005-07-11T12:00:00.000-04:00
    title Telnet Client Information Disclosure Vulnerability
    version 4
redhat via4
advisories
  • rhsa
    id RHSA-2005:504
  • rhsa
    id RHSA-2005:562
rpms
  • telnet-1:0.17-26.EL3.3
  • telnet-1:0.17-31.EL4.3
  • telnet-debuginfo-1:0.17-26.EL3.3
  • telnet-debuginfo-1:0.17-31.EL4.3
  • telnet-server-1:0.17-26.EL3.3
  • telnet-server-1:0.17-31.EL4.3
  • krb5-debuginfo-0:1.2.7-47
  • krb5-devel-0:1.2.7-47
  • krb5-libs-0:1.2.7-47
  • krb5-server-0:1.2.7-47
  • krb5-workstation-0:1.2.7-47
refmap via4
apple APPLE-SA-2006-08-01
bid
  • 13940
  • 19289
cert TA06-214A
cert-vn VU#800829
idefense 20050614 Multiple Vendor Telnet Client Information Disclosure Vulnerability
sectrack 1014203
secunia
  • 17135
  • 21253
sunalert
  • 101665
  • 101671
  • 57755
  • 57761
suse SUSE-SR:2005:016
vupen ADV-2006-3101
statements via4
contributor Mark J Cox
lastmodified 2007-03-14
organization Red Hat
statement Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Last major update 21-01-2020 - 15:45
Published 14-06-2005 - 04:00
Last modified 21-01-2020 - 15:45
Back to Top