Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10188

Опубликовано: 28 фев. 2020
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

A vulnerability was found where incorrect bounds checks in the telnet server’s (telnetd) handling of short writes and urgent data, could lead to information disclosure and corruption of heap data. An unauthenticated remote attacker could exploit these bugs by sending specially crafted telnet packets to achieve arbitrary code execution in the telnet server.

Отчет

This vulnerability exists in the telnet-server package, not in the telnet client-side package. For a Red Hat Enterprise Linux host to be vulnerable, it must have telnet-server installed and the telnetd service enabled. Use of telnetd is not recommended, as it is an un-encrypted protocol with cleartext transmission of passwords; alternatives such as openssh are preferred.

Меры по смягчению последствий

When in enforcing mode, SELinux as configured in Red Hat Enterprise Linux provides some mitigation against an exploit for telnet-server, because it limits the kind of operations it can perform and programs that can be run from the telnet-server's context.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5telnetOut of support scope
Red Hat Enterprise Linux 6telnetFixedRHSA-2020:133506.04.2020
Red Hat Enterprise Linux 6krb5-applFixedRHSA-2020:134907.04.2020
Red Hat Enterprise Linux 7telnetFixedRHSA-2020:133406.04.2020
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)telnetFixedRHSA-2022:001104.01.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupporttelnetFixedRHSA-2022:001104.01.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionstelnetFixedRHSA-2022:001104.01.2022
Red Hat Enterprise Linux 7.7 Advanced Update SupporttelnetFixedRHSA-2022:015818.01.2022
Red Hat Enterprise Linux 7.7 Telco Extended Update SupporttelnetFixedRHSA-2022:015818.01.2022
Red Hat Enterprise Linux 7.7 Update Services for SAP SolutionstelnetFixedRHSA-2022:015818.01.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1811673telnet-server: no bounds checks in nextitem() function allows to remotely execute arbitrary code

EPSS

Процентиль: 92%
0.08404
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

CVSS3: 9.8
nvd
почти 6 лет назад

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

CVSS3: 9.8
debian
почти 6 лет назад

utility.c in telnetd in netkit telnet through 0.17 allows remote attac ...

suse-cvrf
больше 5 лет назад

Security update for krb5-appl

CVSS3: 9.8
github
больше 3 лет назад

utility.c in telnetd in netkit telnet through 0.17 allows remote attackers to execute arbitrary code via short writes or urgent data, because of a buffer overflow involving the netclear and nextitem functions.

EPSS

Процентиль: 92%
0.08404
Низкий

9.8 Critical

CVSS3