GLSA Bodhisattva
Joined: 13 Jun 2003 Posts: 4087 Location: Dresden, Germany
|
Posted: Thu Mar 31, 2005 11:51 am Post subject: [ GLSA 200503-36 ] netkit-telnetd: Buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: netkit-telnetd: Buffer overflow (GLSA 200503-36)
Severity: normal
Exploitable: remote
Date: March 31, 2005
Bug(s): #87211
ID: 200503-36
Synopsis
The netkit-telnetd telnet client is vulnerable to a buffer overflow, which
could allow a malicious telnet server operator to execute arbitrary code.
Background
netkit-telnetd provides standard Linux telnet client and server.
Affected Packages
Package: net-misc/netkit-telnetd
Vulnerable: < 0.17-r6
Unaffected: >= 0.17-r6
Architectures: All supported architectures
Description
A buffer overflow has been identified in the slc_add_reply()
function of netkit-telnetd client, where a large number of SLC commands
can overflow a fixed size buffer.
Impact
Successful explotation would require a vulnerable user to connect
to an attacker-controlled host using telnet, potentially executing
arbitrary code with the permissions of the telnet user.
Workaround
There is no known workaround at this time.
Resolution
All netkit-telnetd users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/netkit-telnetd-0.17-r6" |
References
CAN-2005-0469
iDEFENSE Advisory 03-28-05
Last edited by GLSA on Wed Feb 12, 2014 4:19 am; edited 3 times in total |
|