CVE-2011-4862 is a low severity vulnerability with a CVSS score of 0.0. Exploits are available; patches have been released and should be applied urgently. This is classified as a zero-day vulnerability.
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.
Very high probability of exploitation in the next 30 days
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
| Vendor | Product |
|---|---|
| Opensuse | Opensuse |
| Suse | Linux Enterprise Server |
| Debian | Debian Linux |
| Suse | Linux Enterprise Desktop |
| Freebsd | Freebsd |
| Suse | Linux Enterprise Software Development Kit |
| Gnu | Inetutils |
| Fedoraproject | Fedora |
| Heimdal Project | Heimdal |
| Mit | Krb5 Appl |