Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Gain a shell remotely --> Category: destructive_attack

/bin/login overflow exploitation Vulnerability Scan

Vulnerability Scan Summary
Attempts to log into the remote host

Detailed Explanation for this Vulnerability Test

Synopsis :

It is possible to execute arbitrary commands on the remote host.

Description :

The remote implementation of the /bin/login utility, used when authenticating
a user via telnet or rsh contains an overflow which allows a possible hacker to
gain a shell on this host, without even sending a shell code.

A possible hacker may use this flaw to log in as any user (except root) on the
remote host.

Solution :

Threat Level:

Critical / CVSS Base Score : 10

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.