Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-39028

Опубликовано: 30 авг. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2:2.3-5
esm-apps/bionic

released

2:1.9.4-3ubuntu0.1+esm2
esm-apps/focal

released

2:1.9.4-11ubuntu0.2
esm-apps/jammy

released

2:2.2-2ubuntu0.1
esm-apps/xenial

released

2:1.9.4-1ubuntu0.1~esm3
esm-infra-legacy/trusty

released

2:1.9.2-1ubuntu0.1~esm2
focal

released

2:1.9.4-11ubuntu0.2
jammy

released

2:2.2-2ubuntu0.1
kinetic

not-affected

2:2.3-5

Показывать по

EPSS

Процентиль: 64%
0.00475
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 3 лет назад

telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.

CVSS3: 7.5
nvd
больше 3 лет назад

telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.

CVSS3: 7.5
debian
больше 3 лет назад

telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and ...

suse-cvrf
больше 3 лет назад

Security update for telnet

suse-cvrf
больше 3 лет назад

Security update for telnet

EPSS

Процентиль: 64%
0.00475
Низкий

7.5 High

CVSS3

Уязвимость CVE-2022-39028