Lucene search

K
saintSAINT CorporationSAINT:C28F9E7D01F020FA554E7E8ABD842919
HistoryFeb 16, 2007 - 12:00 a.m.

Solaris telnetd authentication bypass

2007-02-1600:00:00
SAINT Corporation
download.saintcorporation.com
30

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.865 High

EPSS

Percentile

98.6%

Added: 02/16/2007
CVE: CVE-2007-0882
BID: 22512
OSVDB: 31881

Background

The Telnet service allows remote users to authenticate to a system and use an interactive command shell. The Telnet service is implemented by the Telnet daemon, **telnetd**.

Problem

The **telnetd** program in Solaris 10 and 11 misinterprets **USER** environment variables beginning with “-f”, resulting in an authentication bypass vulnerability. A remote attacker could execute arbitrary commands using a standard telnet client program.

Resolution

Apply one of the patches referenced in Sun Alert 102802.

References

<http://secunia.com/advisories/24120&gt;
<http://www.kb.cert.org/vuls/id/881872&gt;

Limitations

Exploit works on Solaris 10 and 11. Root access can only be gained if the target system allows non-console superuser access.

Platforms

SunOS

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.865 High

EPSS

Percentile

98.6%