Flaw bug created to hold information about an old flaw we knew something about. For more details see the MITRE CVE description.
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
Red Hat would like to thank iDefense for their responsible disclosure of this issue.