{"id":"AZL-37050","summary":"CVE-2005-0469 affecting package telnet 0.17-81","details":"Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.","modified":"2026-04-01T05:12:23.965007Z","published":"2005-05-02T04:00:00Z","upstream":["CVE-2005-0469"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0469"}],"affected":[{"package":{"name":"telnet","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/telnet"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"0.17-81"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-37050.json"}}],"schema_version":"1.7.5"}