This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-25 21:13:12 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
39f6cbff-b30a-11e9-a87f-a4badb2f4699 | FreeBSD -- telnet(1) client multiple vulnerabilitiesProblem Description:Insufficient validation of environment variables in the telnet client supplied in FreeBSD can lead to stack-based buffer overflows. A stack- based overflow is present in the handling of environment variables when connecting via the telnet client to remote telnet servers. This issue only affects the telnet client. Inbound telnet sessions to telnetd(8) are not affected by this issue. Impact:These buffer overflows may be triggered when connecting to a malicious server, or by an active attacker in the network path between the client and server. Specially crafted TELNET command sequences may cause the execution of arbitrary code with the privileges of the user invoking telnet(1). Discovery 2019-07-24 Entry 2019-07-30 FreeBSD ge 12.0 lt 12.0_8 ge 11.2 lt 11.2_12 ge 11.3 lt 11.3_1 CVE-2019-0053 SA-19:12.telnet |