Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 675846 - (CVE-2011-0900, CVE-2011-0901) CVE-2011-0900 CVE-2011-0901 tsclient: multiple stack-based buffer overflows in tsc_launch_remote()
CVE-2011-0900 CVE-2011-0901 tsclient: multiple stack-based buffer overflows i...
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
public=20110202,reported=20110207,sou...
: Security
Depends On:
Blocks: 712421
  Show dependency treegraph
 
Reported: 2011-02-07 17:30 EST by Vincent Danen
Modified: 2016-03-04 05:49 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-06-21 13:36:01 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2011-02-07 17:30:30 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-0900 to
the following vulnerability:

Name: CVE-2011-0900
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0900
Assigned: 20110207
Reference: http://www.exploit-db.com/exploits/16095
Reference: http://www.securityfocus.com/bid/46099
Reference: http://osvdb.org/70749
Reference: http://secunia.com/advisories/43120
Reference: http://xforce.iss.net/xforce/xfdb/65100

Stack-based buffer overflow in the tsc_launch_remote function
(src/support.c) in Terminal Server Client (tsclient) 0.150, and
possibly other versions, allows user-assisted remote attackers to
execute arbitrary code via a .RDP file with a long hostname argument.



Common Vulnerabilities and Exposures assigned an identifier CVE-2011-0901 to
the following vulnerability:

Name: CVE-2011-0901
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0901
Assigned: 20110207
Reference: URL: http://osvdb.org/70749
Reference: URL: http://secunia.com/advisories/43120
Reference: URL: http://xforce.iss.net/xforce/xfdb/65103
Reference: URL: http://xforce.iss.net/xforce/xfdb/65102
Reference: URL: http://xforce.iss.net/xforce/xfdb/65101

Multiple stack-based buffer overflows in the tsc_launch_remote
function (src/support.c) in Terminal Server Client (tsclient) 0.150,
and possibly other versions, allow user-assisted remote attackers to
execute arbitrary code via a .RDP file with a long (1) username, (2)
password, or (3) domain argument.  NOTE: the provenance of this
information is unknown; the details are obtained solely from third
party information.
Comment 3 Josh Bressers 2011-06-21 13:36:01 EDT
This issue is a crash only on Red Hat Enterprise Linux 5 and above. The cost of fixing this for Red Hat Enterprise Linux 4 is outweighed by the minimal risk presented. At this time Red Hat does not plan to fix this flaw.

Note You need to log in before you can comment on or make changes to this bug.