blob: 1b48e63840d87eec0e2b73f3d1823d8303897460 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200503-36">
<title>netkit-telnetd: Buffer overflow</title>
The netkit-telnetd telnet client is vulnerable to a buffer overflow, which
could allow a malicious telnet server operator to execute arbitrary code.
<product type="ebuild">netkit-telnetd</product>
<announced>March 31, 2005</announced>
<revised>March 31, 2005: 01</revised>
<package name="net-misc/netkit-telnetd" auto="yes" arch="*">
<unaffected range="ge">0.17-r6</unaffected>
<vulnerable range="lt">0.17-r6</vulnerable>
netkit-telnetd provides standard Linux telnet client and server.
A buffer overflow has been identified in the slc_add_reply()
function of netkit-telnetd client, where a large number of SLC commands
can overflow a fixed size buffer.
<impact type="normal">
Successful explotation would require a vulnerable user to connect
to an attacker-controlled host using telnet, potentially executing
arbitrary code with the permissions of the telnet user.
There is no known workaround at this time.
All netkit-telnetd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-misc/netkit-telnetd-0.17-r6&quot;</code>
<uri link="">CAN-2005-0469</uri>
<uri link=";type=vulnerabilities">iDEFENSE Advisory 03-28-05</uri>
<metadata tag="requester" timestamp="Wed, 30 Mar 2005 08:13:45 +0000">
<metadata tag="submitter" timestamp="Wed, 30 Mar 2005 13:44:36 +0000">
<metadata tag="bugReady" timestamp="Wed, 30 Mar 2005 19:43:01 +0000">