CVE-2001-0554

Public Exploit

Description

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

Category

10.0
CVSS
Severity: Critical
CVSS 2.0 •
EPSS 27.44% Top 5%
Vendor Advisory com.br Vendor Advisory linux-mandrake.com Vendor Advisory compaq.com Vendor Advisory securityfocus.com Vendor Advisory redhat.com Vendor Advisory novell.com Vendor Advisory caldera.com Vendor Advisory redhat.com Vendor Advisory cisco.com Vendor Advisory neohapsis.com Vendor Advisory debian.org Vendor Advisory FreeBSD.org Vendor Advisory calderasystems.com Vendor Advisory debian.org Vendor Advisory sgi.com Vendor Advisory netbsd.org Vendor Advisory securityfocus.com Vendor Advisory securityfocus.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 vendor advisory broken link
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-068.php3 vendor advisory broken link
http://www.ciac.org/ciac/bulletins/l-131.shtml third party advisory broken link government resource
http://ftp.support.compaq.com/patches/.new/html/SSRT0745U.shtml vendor advisory broken link
https://exchange.xforce.ibmcloud.com/vulnerabilities/6875 third party advisory vdb entry
http://www.osvdb.org/809 vdb entry broken link
http://online.securityfocus.com/advisories/3476 vendor advisory broken link third party advisory vdb entry
http://online.securityfocus.com/archive/1/199496 broken link mailing list third party advisory vdb entry
http://online.securityfocus.com/archive/1/203000 broken link mailing list third party advisory vdb entry
http://www.securityfocus.com/bid/3064 patch vdb entry exploit vendor advisory third party advisory
http://www.redhat.com/support/errata/RHSA-2001-100.html third party advisory vendor advisory
http://www.novell.com/linux/security/advisories/2001_029_nkitb_txt.html vendor advisory broken link
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt vendor advisory broken link
http://www.redhat.com/support/errata/RHSA-2001-099.html third party advisory vendor advisory
http://www.cisco.com/warp/public/707/catos-telrcv-vuln-pub.shtml third party advisory vendor advisory
http://archives.neohapsis.com/archives/hp/2001-q4/0014.html vendor advisory broken link
http://www.debian.org/security/2001/dsa-075 third party advisory vendor advisory
http://www.securityfocus.com/archive/1/197804 mailing list vdb entry exploit vendor advisory third party advisory
http://www.cert.org/advisories/CA-2001-21.html patch third party advisory us government resource
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc patch vendor advisory broken link
http://www.calderasystems.com/support/security/advisories/CSSA-2001-030.0.txt vendor advisory broken link
http://www.debian.org/security/2001/dsa-070 third party advisory vendor advisory
http://online.securityfocus.com/archive/1/199541 broken link mailing list third party advisory vdb entry
ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P vendor advisory broken link
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc vendor advisory broken link

Frequently Asked Questions

What is the severity of CVE-2001-0554?
CVE-2001-0554 has been scored as a critical severity vulnerability.
How to fix CVE-2001-0554?
To fix CVE-2001-0554, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2001-0554 being actively exploited in the wild?
It is possible that CVE-2001-0554 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~27% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.