Joined: 13 Jun 2003
Location: Dresden, Germany
|Posted: Thu Mar 31, 2005 11:51 am Post subject: [ GLSA 200503-36 ] netkit-telnetd: Buffer overflow
|Gentoo Linux Security Advisory
Title: netkit-telnetd: Buffer overflow (GLSA 200503-36)
Date: March 31, 2005
The netkit-telnetd telnet client is vulnerable to a buffer overflow, which
could allow a malicious telnet server operator to execute arbitrary code.
netkit-telnetd provides standard Linux telnet client and server.
Vulnerable: < 0.17-r6
Unaffected: >= 0.17-r6
Architectures: All supported architectures
A buffer overflow has been identified in the slc_add_reply()
function of netkit-telnetd client, where a large number of SLC commands
can overflow a fixed size buffer.
Successful explotation would require a vulnerable user to connect
to an attacker-controlled host using telnet, potentially executing
arbitrary code with the permissions of the telnet user.
There is no known workaround at this time.
All netkit-telnetd users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/netkit-telnetd-0.17-r6"
iDEFENSE Advisory 03-28-05
Last edited by GLSA on Wed Feb 12, 2014 4:19 am; edited 3 times in total