BSDI Information for VU#745371
Multiple vendor telnet daemons vulnerable to buffer overflow via crafted protocol options
- Vendor Information Help Date Notified: 23 Jul 2001
- Statement Date:
- Date Updated: 15 Aug 2001
All current versions of BSD/OS are vulnerable. Patches will be available via our web site at http://www.bsdi.com/services/support/patches and via ftp at ftp://ftp.bsdi.com/bsdi/support/patches as soon as testing has been completed.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.