Unrated severityNVD Advisory· Published May 2, 2005· Updated Apr 16, 2026
CVE-2005-0468
CVE-2005-0468
Description
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
20- patches.sgi.com/support/free/security/advisories/20050405-01-PnvdPatch
- web.mit.edu/kerberos/advisories/MITKRB5-SA-2005-001-telnet.txtnvdPatchVendor Advisory
- www.debian.org/security/2005/dsa-703nvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2005-327.htmlnvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2005-330.htmlnvdPatchVendor Advisory
- ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:01.telnet.ascnvdVendor Advisory
- www.idefense.com/application/poi/displaynvdVendor Advisory
- www.kb.cert.org/vuls/id/341908nvdUS Government Resource
- distro.conectiva.com.br/atualizacoes/nvd
- secunia.com/advisories/14745nvd
- secunia.com/advisories/17899nvd
- sunsolve.sun.com/search/document.donvd
- sunsolve.sun.com/search/document.donvd
- sunsolve.sun.com/search/document.donvd
- sunsolve.sun.com/search/document.donvd
- www.debian.de/security/2005/dsa-731nvd
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/bid/12919nvd
- www.ubuntulinux.org/usn/usn-224-1nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9640nvd
News mentions
0No linked articles in our index yet.