First published: Fri Oct 13 2000(Updated: )
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.5.3f | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.5.2m | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =6.5.3m | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =5.2 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0733 is considered a critical vulnerability as it allows remote attackers to execute arbitrary commands on vulnerable systems.
To fix CVE-2000-0733, update your IRIX telnetd to a version that does not contain the format string vulnerability.
CVE-2000-0733 affects SGI IRIX versions from 5.2 to 6.5.8 inclusive.
An attacker can exploit CVE-2000-0733 to execute arbitrary commands remotely via specially crafted Telnet requests.
As a temporary workaround for CVE-2000-0733, consider disabling the Telnet service or restricting access to trusted hosts only.