The telnetd service in FreeBSD 9.3, 10.1, 10.2, 10.3, and 11.0 allows remote attackers to inject arguments to login and bypass authentication via vectors involving a "sequence of memory allocation failures."
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securitytracker.com/id/1037399 | Third Party Advisory VDB Entry | 
| https://www.freebsd.org/security/advisories/FreeBSD-SA-16:36.telnetd.asc | Vendor Advisory | 
| http://www.securitytracker.com/id/1037399 | Third Party Advisory VDB Entry | 
| https://www.freebsd.org/security/advisories/FreeBSD-SA-16:36.telnetd.asc | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 02:47
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securitytracker.com/id/1037399 - Third Party Advisory, VDB Entry | |
| References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-16:36.telnetd.asc - Vendor Advisory | 
Information
                Published : 2017-02-15 15:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-1888
Mitre link : CVE-2016-1888
CVE.ORG link : CVE-2016-1888
JSON object : View
Products Affected
                freebsd
- freebsd
 
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
