SGI Information for VU#745371
Multiple vendor telnet daemons vulnerable to buffer overflow via crafted protocol options
SGI acknowledges the telnetd vulnerability reported by CERT and is currently investigating. Until SGI has more definitive information to provide, customers are encouraged to assume all security vulnerabilities as exploitable and take appropriate steps according to local site security policies and requirements.
As further information becomes available, additional advisories will be issued via the normal SGI security information distribution methods including the wiretap mailing list and
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.