not very informative...
I'm sorry, none of this article makes real sense to me; I'm probably not familiar enough with Cisco's "web, email and content security management appliances" (and I thank Dog everyday for that fact, too. It's the little things in life, you know).
From the BSD bug report:
II. Problem Description
When an encryption key is supplied via the TELNET protocol, its length
is not validated before the key is copied into a fixed-size buffer.
III. Impact
An attacker who can connect to the telnetd daemon can execute arbitrary
code with the privileges of the daemon (which is usually the "root"
superuser).
Now, that I can understand. Pretty simple to patch really, unless I'm missing something. (also, ssh, d'uh)