exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NetBSD-SA2001-012.txt.asc

NetBSD-SA2001-012.txt.asc
Posted Feb 5, 2002

NetBSD Security Advisory 2001-012 - A remotely exploitable buffer overflow found in BSD derived telnet daemons can be used to execute shell code with root privileges.

tags | overflow, shell, root
systems | netbsd, bsd
SHA-256 | abd588019233fcad4fe67559cd67fe90fa0e9b1db3af226b1c231844e91ea10b

NetBSD-SA2001-012.txt.asc

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----


NetBSD Security Advisory 2001-012
=================================

Topic: telnetd(8) options overflow

Version: All NetBSD releases prior to 2001-07-19

Severity: remote root from any host which can connect to telnetd(8)

Fixed: NetBSD-current: 2001-07-19
NetBSD-1.5 branch: 2001-07-29
NetBSD-1.4 branch: Supplied patch (see below).

A patch is provided for all releases that will fix
the problem. Pullups to other branches are
anticipated, see 'More Information' below for how to
track this progress.

Abstract
========

A buffer overflow existed in the telnetd(8) program. Any client
connecting could cause the telnetd instance to SEGV, and possibly
to execute arbitrary code as root.


Technical Details
=================

Technical details of the vulnerabilities are publicised in
CERT Advisory CA-2001-21:
https://www.cert.org/advisories/CA-2001-21.html

A strong indication of attempted exploitation of this bug may be found
by examining log entries sent to the syslogd(8) system logger facility
DAEMON (which is stored in /var/log/messages by default) of the form:
telnetd \[[0-9]*\]: ttloop: peer died: No such file or directory


Solutions and Workarounds
=========================

telnetd(8) has been shipped disabled since June 2000, including the
NetBSD 1.5 and 1.5.1 releases, and -current after that date.

If you are running an earlier release, or have re-enabled telnetd(8)
in 1.5.x, disable it now by commenting out the line beginning with
telnetd(8) in /etc/inetd.conf, and kill -HUP your inetd process.

As a reminder, unless you are running on a private network, telnet
exposes your passwords to the Internet. Even on a private network,
passwords may be exposed to inappropriate individuals. Use a strong,
secure protocol, such as Secure Shell instead.

The following instructions describe how to upgrade your telnetd(8)
by updating your source tree and rebuilding and installing a new
version of telnetd(8).

* NetBSD -current, 1.5, 1.5.1:

Systems running NetBSD-current dated from before 2001-07-19
should be upgraded to NetBSD-current dated 2001-07-20 or later.

Systems running NetBSD 1.5 or 1.5.1 dated from before
2001-07-29 should be upgraded to NetBSD 1.5.x sources dated
2001-07-30 or later.

The following directory needs to be updated from the
netbsd-current CVS branch (aka HEAD) for NetBSD-current,
or netbsd-1-5 CVS branch for NetBSD 1.5 or 1.5.1:
src/libexec/telnetd

To update from CVS, re-build, and re-install telnetd(8):
# cd src/libexec/telnetd
# cvs update -d -P
# make cleandir dependall install


Alternatively, apply the following patch (with potential offset
differences) and rebuild & re-install telnetd(8):
ftp://ftp.netbsd.org/pub/NetBSD/security/patches/SA2001-012-telnetd.patch

To patch, re-build and re-install telnetd(8):
# cd src/libexec/telnetd
# patch < /path/to/SA2001-012-telnetd.patch
# make cleandir dependall install


* NetBSD 1.3, 1.3.x, 1.4, 1.4.x:

Systems running NetBSD releases up to and including 1.5.1 should
apply the following patch (with potential offset differences):
ftp://ftp.netbsd.org/pub/NetBSD/security/patches/SA2001-012-telnetd.patch

To patch, re-build and re-install telnetd(8):
# cd src/libexec/telnetd
# patch < /path/to/SA2001-012-telnetd.patch
# make cleandir dependall install


The anonymous CVS branch netbsd-1-4 should be updated with a
fix in the near future.


Thanks To
=========

TESO for the advisory.

Jason Thorpe <thorpej@netbsd.org> for analysis.

Krister Walfridsson <kristerw@netbsd.org> for testing.

Jun-ichiro Hagino <itojun@netbsd.org> for a fix in NetBSD-current
from the Heimdal telnetd sources, by way of OpenBSD.

David Maxwell <david@netbsd.org> for the fix for previous releases.


Revision History
================

2001-07-25 Initial revision.

2001-07-25 Info on how to detect exploit attempts.

2001-08-08 Update for netbsd-1-5 pullup.


More Information
================

An up-to-date PGP signed copy of this release will be maintained at
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc

Information about NetBSD and NetBSD security can be found at
https://www.NetBSD.ORG/ and https://www.NetBSD.ORG/Security/.


Copyright 2001, The NetBSD Foundation, Inc. All Rights Reserved.

$NetBSD: NetBSD-SA2001-012.txt,v 1.13 2001/08/08 01:22:37 lukem Exp $

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (NetBSD)
Comment: For info see https://www.gnupg.org

iQCVAwUBO3s4kD5Ru2/4N2IFAQFa2QP+PmmIoD/0tCgJaesTJCeydCQQovak4grx
aWcvY1Kqauv5gueSJ4w+vMUOK2BOsK/Ny0ViIZtfgExELFn1585UPhAbSbYeFA5j
g5i4jYrFNYWYvJwgRhHWtg81nsW/7urLu0SUnurdSAa5TpdifKJNZmAtqlpfE+ke
TxXOmk838ho=
=Mr89
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close