Subject: Re: telnetd exploit?
To: Matt London <matt@knm.yi.org>
From: Ed Ravin <eravin@panix.com>
List: tech-security
Date: 07/23/2001 21:21:17
FreeBSD just released their fixes for this problem:
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-01:49/telnetd-crypto.patch
Matt London writes:
> I came across this at http://www.team-teso.net/ today, and I don't see
> any posts about it in the archive so far...
>
> ---[cut]---
> Within most of the current telnet daemons in use today there exist a buffer
> overflow in the telnet option handling. Under certain circumstances it may
> be possible to exploit it to gain root priviledges remotely.