Korean
<< Back
VID 23012
Severity 40
Port 4224
Protocol TCP
Class XTELLD
Detailed Description The xtell daemon is vulnerable to multiple buffer overflow attacks.
Xtell is a simple network messaging program. It may be used to transmit terminal messages between users and machines. xtell is available for Linux, BSD and most other Unix based operating systems.
Multiple buffer overflow vulnerabilities have been reported in some versions of xtell. Overflow conditions may be caused if long strings are sent by a malicious DNS server in response to the reverse lookup performed when a message is received, either through the auth string returned by the ident server, or through directly sending an overly long message to the vulnerable user.
Successful exploitation of these vulnerabilities may result in arbitrary code being executed as the xtell daemon.

Platforms Affected:
* xtell xtell 2.6.1

* References:
http://online.securityfocus.com/bid/4193
http://www.iss.net/security_center/static/8312.php
Recommendation For Debian GNU/Linux 2.2 (potato):
Upgrade to the latest version of xtell (1.91.1 or later), as listed in Debian Security Advisory DSA 121-1, http://www.debian.org/security/2002/dsa-121

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2002-0332 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)