Search for vulnerabilities
| Vulnerability ID | VCID-unvx-tsxw-abbw |
| Aliases |
CVE-2011-4862
|
| Summary | A boundary error in Heimdal could result in execution of arbitrary code. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 0.8 |
| Risk | 1.6 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| epss | 0.92585 | https://api.first.org/data/v1/epss?cve=CVE-2011-4862 |
| epss | 0.92585 | https://api.first.org/data/v1/epss?cve=CVE-2011-4862 |
| epss | 0.92585 | https://api.first.org/data/v1/epss?cve=CVE-2011-4862 |
| Data source | Exploit-DB |
|---|---|
| Date added | Dec. 26, 2011 |
| Description | TelnetD encrypt_keyid - Function Pointer Overwrite |
| Ransomware campaign use | Known |
| Source publication date | Dec. 26, 2011 |
| Exploit type | remote |
| Platform | linux |
| Source update date | Dec. 5, 2016 |
| Data source | Metasploit |
|---|---|
| Description | This module exploits a buffer overflow in the encryption option handler of the Linux BSD-derived telnet service (inetutils or krb5-telnet). Most Linux distributions use NetKit-derived telnet daemons, so this flaw only applies to a small subset of Linux systems running telnetd. |
| Note | Reliability: - unknown-reliability Stability: - unknown-stability SideEffects: - unknown-side-effects |
| Ransomware campaign use | Unknown |
| Source publication date | Dec. 23, 2011 |
| Platform | Linux |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/telnet/telnet_encrypt_keyid.rb |
| Percentile | 0.9974 |
| EPSS Score | 0.92585 |
| Published At | April 4, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T13:00:32.256332+00:00 | Gentoo Importer | Import | https://security.gentoo.org/glsa/201202-05 | 38.0.0 |