Lucene search

K
gentooGentoo FoundationGLSA-200503-36
HistoryMar 31, 2005 - 12:00 a.m.

netkit-telnetd: Buffer overflow

2005-03-3100:00:00
Gentoo Foundation
security.gentoo.org
11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.921 High

EPSS

Percentile

98.9%

Background

netkit-telnetd provides standard Linux telnet client and server.

Description

A buffer overflow has been identified in the slc_add_reply() function of netkit-telnetd client, where a large number of SLC commands can overflow a fixed size buffer.

Impact

Successful explotation would require a vulnerable user to connect to an attacker-controlled host using telnet, potentially executing arbitrary code with the permissions of the telnet user.

Workaround

There is no known workaround at this time.

Resolution

All netkit-telnetd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/netkit-telnetd-0.17-r6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/netkit-telnetd< 0.17-r6UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.921 High

EPSS

Percentile

98.9%