Family: Gain a shell remotely --> Category: destructive_attack
/bin/login overflow exploitation Vulnerability Scan
Vulnerability Scan Summary
Attempts to log into the remote host
Detailed Explanation for this Vulnerability Test
It is possible to execute arbitrary commands on the remote host.
The remote implementation of the /bin/login utility, used when authenticating
a user via telnet or rsh contains an overflow which allows a possible hacker to
gain a shell on this host, without even sending a shell code.
A possible hacker may use this flaw to log in as any user (except root) on the
Critical / CVSS Base Score : 10
Click HERE for more information and discussions on this network vulnerability scan.