Buffer Overflow in rlogin Program

HIGH (10.0) No Patch (10538 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 2.83% chance of exploitation (percentile: 86%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

The rlogin program is a remote login tool for Unix-like systems. It allows users to remotely access and manage their system. This vulnerability occurs due to a buffer overflow when the TERM environmental variable is used, allowing an attacker to execute arbitrary commands on the system.

Am I affected?

Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

Not specified (vintage BSD system) / rlogin

How to fix

There is no public patch link available for this vulnerability. However, immediate mitigations can be applied:
- Disable the rlogin service (if it's running) to prevent exploitation.
- Remove any outdated or unused versions of the rlogin program from your system.
- Consider replacing the rlogin program with a more secure alternative like SSH.