Executive Summary

Summary
Title New netkit-telnet packages really fix denial of service
Informations
Name DSA-556 First vendor Publication 1970-01-01
Vendor Debian Last vendor Modification 1970-01-01
Severity (Vendor) N/A Revision 2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

This is an update for DSA 556-1 which was intended to fix a denial of service situation in netkit-telnet but didn't. The update for unstable did fix the problem. For completeness below is the original advisory text:

Michal Zalewski discovered a bug in the netkit-telnet server (telnetd) whereby a remote attacker could cause the telnetd process to free an invalid pointer. This causes the telnet server process to crash, leading to a straightforward denial of service (inetd will disable the service if telnetd is crashed repeatedly), or possibly the execution of arbitrary code with the privileges of the telnetd process (by default, the 'telnetd' user).

For the unstable distribution (sid) this problem has been fixed in version 0.17-26.

For the stable distribution (woody) this problem has been fixed in version 0.17-18woody2.

We recommend that you upgrade your netkit-telnet-ssl package.

Original Source

Url : http://www.debian.org/security/1970/dsa-556

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 556-1 (netkit-telnet)
File : nvt/deb_556_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 556-2 (netkit-telnet)
File : nvt/deb_556_2.nasl
2008-01-17 Name : Debian Security Advisory DSA 569-1 (netkit-telnet-ssl)
File : nvt/deb_569_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
10531 netkit-telnetd AYT Command Memory Handling Overflow

A remote overflow exists in netkit-telnetd. The telnet daemon has an error within the processing of AYT ("Are You There") commands and may cause an invalid pointer to be freed resulting in a buffer overflow. With a specially crafted request, an attacker may cause a denial of servce or potentially execute arbitrary code resulting in a loss of integrity and/or availability.

Nessus® Vulnerability Scanner

Date Description
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-101-1.nasl - Type : ACT_GATHER_INFO
2004-11-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-556.nasl - Type : ACT_GATHER_INFO
2004-11-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-569.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:33:28
  • Multiple Updates