CVE-1999-1098
CVSS5.0
发布时间 :1995-03-03 00:00:00
修订时间 :2008-09-05 16:18:43
NMCOS    

[原文]Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.


[CNNVD]Berkeley Telnet Kerberos漏洞(CNNVD-199503-002)

        具有加密术和Kerberos 4身份验证的BSD远程登录客户端存在漏洞。远程攻击者可以通过嗅探解密会话。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1098
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-1098
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199503-002
(官方数据源) CNNVD

- 其它链接及资源

http://www.cert.org/advisories/CA-1995-03.html
(VENDOR_ADVISORY)  CERT  CA-1995-03
http://www.ciac.org/ciac/bulletins/f-12.shtml
(VENDOR_ADVISORY)  CIAC  F-12
http://www.osvdb.org/4881
(UNKNOWN)  OSVDB  4881
http://www.iss.net/security_center/static/516.php
(UNKNOWN)  XF  bsd-telnet(516)

- 漏洞信息

Berkeley Telnet Kerberos漏洞
中危 设计错误
1995-03-03 00:00:00 2005-05-02 00:00:00
远程  
        具有加密术和Kerberos 4身份验证的BSD远程登录客户端存在漏洞。远程攻击者可以通过嗅探解密会话。

- 公告与补丁

        A patch exists and is available via anonymous FTP from 'net-dist.mit.edu' in the directory '/pub/telnet'.
        The patch (which is also included in this message) can be found in the file '/pub/telnet/telnet.patch'. The file '/pub/telnet/telnet.patch.sig' contains a detached PGP signature of this file.
        Users of NCSA Telnet should upgrade to the NCSA telnet 2.6.1d4, which is available from 'ftp.ncsa.uiuc.edu' in the directory '/Mac/Telnet/Telnet2.6/prerelease/d4'.
        Customers of FTP Software with an encrypting telnet (provided in the PC/TCP or OnNet packages) should call the FTP technical support line at 1-800-282-4387 and ask for the 'tn encrypt patch'.

- 漏洞信息

4881
BSD Telnet Client Kerberos Session Sniffing
Remote / Network Access Cryptographic, Information Disclosure
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

The Berkeley telnet client contains a flaw that may lead to an unauthorized password exposure. It is possible to gain access to encrypted passwords when the telnet client uses kerberos 4, which may lead to a loss of confidentiality, integrity and/or availability.

- 时间线

1995-02-21 Unknow
Unknow Unknow

- 解决方案

Upgrade to NCSA version 2.6.1d7 or higher, as it has been reported to fix this vulnerability. BSD has also released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Berkeley Telnet Kerberos Vulnerability
Design Error 139
Yes No
1998-12-31 12:00:00 2007-05-31 07:31:00
Mr Spooty (spootyboy@HOTBOT.COM) first reported the bug in Bugtraq on Thu, 31 Dec 1998.

- 受影响的程序版本

BSD Telnet 0

- 漏洞讨论

Berkeley telnet client is prone to a vulnerability that affects the experimental telnet encryption option using Kerberos V4 authentication.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:vuldb@securityfocus.com.

- 解决方案

A patch exists and is available via anonymous FTP from 'net-dist.mit.edu' in the directory '/pub/telnet'.

The patch (which is also included in this message) can be found in the file '/pub/telnet/telnet.patch'. The file '/pub/telnet/telnet.patch.sig' contains a detached PGP signature of this file.

Users of NCSA Telnet should upgrade to the NCSA telnet 2.6.1d4, which is available from 'ftp.ncsa.uiuc.edu' in the directory '/Mac/Telnet/Telnet2.6/prerelease/d4'.

Customers of FTP Software with an encrypting telnet (provided in the PC/TCP or OnNet packages) should call the FTP technical support line at 1-800-282-4387 and ask for the 'tn encrypt patch'.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站