Red Hat Linux 6.0 RHSA-1999:029-01 moderate: telnetd denial of service
Summary
Summary
in.telnetd attempts to negotiate a compatible terminal typebetween the local and remote host. By setting the TERMenvironment variable before connecting, a remote user couldcause the system telnetd to open files it should not. Dependingon the TERM setting used, this could lead to denial of serviceattacks.
Thanks go to Michal Zalewski and the Linux Security Audit teamfor noting this vulnerability.
Solution
For each RPM for your particular architecture, run:
rpm -Uvh filename
where filename is the name of the RPM.
Then, restart inetd, by running:
/etc/rc.d/init.d/inet restart
9. Verification:
MD5 sum Package Name
4360d47490f13d60b8737d28dc88825a i386/telnet-0.10-29.i386.rpm
90213fcdca41a3ed12ab7d92344e7286 alpha/telnet-0.10-29.alpha.rpm
277787dbc39dff8ea84d4b16dcb7a954 sparc/telnet-0.10-29.sparc.rpm
269783a0754d234f7bef0f4717a8dbc2 SRPMS/telnet-0.10-29.src.rpm
These packages are also PGP signed by Red Hat Inc. for security. Our
key is available at:
You can verify each package with the following command:
rpm --checksig filename
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nopgp filename
References
Package List
Topic
Topic
A denial of service attack has been fixed in in.telnetd.
2. Bug IDs fixed:
4560
Relevant Releases Architectures
Red Hat Linux 6.0, all architectures
4. Obsoleted by:
None
5. Conflicts with:
None
6. RPMs required:
Intel:
telnet-
0.10-29.i386.rpm
Alpha:
telnet-
0.10-29.alpha.rpm
SPARC:
telnet-
0.10-29.sparc.rpm
Source:
telnet-
0.10-29.src.rpm
Architecture neutral:
Bugs Fixed